Re: [gentoo-user] Re: ncurses: reductio ad absurdum
On Saturday 29 Aug 2015 04:32:48 Dale wrote: walt wrote: On Fri, 28 Aug 2015 15:29:20 -0400 Rich Freeman ri...@gentoo.org wrote: I used to think git looked really complicated until I sat through a one hour talk that focused mostly on the data model. Once you understand the data model, you understand everything. That doesn't take a lot of time. Does that talk happen to be available on youtube or some equivalent? I'm a git fanboi in spite of its failings. I've been using git since Linus and Larry McVoy divorced (amicably, claims Linus) over where the kernel source repo would reside. That amicable divorce spawned the development of git in the first place (says Linus). I'm no expert on git, but 'git bisect' has allowed me to file countless (for countless = than the number of cc's of vino in my glass) bug reports over the years. I see that all the gentooers who replied to my post have been lingering in this mailing list for years. (You are Old Farts, by my definition.) All gentoo Old Farts are here because we are gentoo addicts and not one of us could abandon gentoo even if we wanted to. Including me. That may help me too. It took me a while to have a sorta understanding of how Gentoo is set up ebuild wise and such and now I feel like I did back in 2003. Having it on youtube or something would be really good. I did find this tho: https://www.youtube.com/watch?v=73I5dRucCds I'll try to watch it later. Don't. You'll waste an inordinate amount of time listening to the drone of someone's uncontrollable verbiage, which contains less that 1% meaningful information. I suspect that 10 minutes should be enough to explain what git is, what github is, how you use them. Unfortunately, any videos I found over a 10 minute youtube search didn't provide me with anything useful to share. :-( -- Regards, Mick signature.asc Description: This is a digitally signed message part.
Re: [gentoo-user] Cellphone VFAT datestamps versus linux datestamps
On 8/28/18 10:39 PM, Walter Dnes wrote: > On Mon, Aug 27, 2018 at 11:31:33PM -0400, james wrote > >> Exif is the data particulars form man image(photo) file formats >> >> >> media-libs/exiftool >> Read and write meta information in image, audio and video files > > This is getting "curiouser and curiouser". I should have done this > sooner. I assumed that the datestamp and EXIF data would be the same. > But checking "properties" with gqview shows the EXIF date data is > correct, with the file datestamp being out to lunch... > > [i660][waltdnes][~/camera/20180824] exiftool -T -CreateDate IMG_0363.jpg > 2018:08:24 14:12:19 > > [i660][waltdnes][~/camera/20180824] ll -og IMG_0363.jpg > -rw-r--r-- 1 477731 Jan 26 2013 IMG_0363.jpg > > Given this info, I can cobble together a short script. A "for" loop > cycles through "*.jpg". Read "CreateDate" from the EXIF data, and feed > it into the "touch" command, which would reset the physical file > datestamp. > Your other post; verycool old phone; I to have several flip phones an LG still 'on service. JTAG interfaces to the hardware is even cooler. Gotta get a giant magnifier for that sort of access work. Glad to have helped. If you get into EXIF data. check out "photogammetry" as 2d still photos can be 'stitched' together to create awesome 3D and 3D+motion models. One of the key usages of HPC. If I can only stay healthy SfM (structure from motion) is my latest addiction It's just very very cool technology. Some folks are building 3D-motion models of the inside of their lab. Cover the wall with monitors and then animate the objects inside, work remotely (like a VR game) or walk into the home_lab and work as normal. Building your own, is where the fun is. Get a UAV pilot's license and a sub 1K drone and well, just let your imagination go wild! gqview -- nice piece of old software. I'll have to check it out.. it's age on sourceforge is a bit to worry about. I'd pack it up and put it in /usr/local/ or at least into a github/gitlab/gogs or wherever you archive codes. Lots of stuff is disappearing now, related to geo-tagging and image processing. I've pretty much settled on [ https://gogs.io ] Surely there are plugins for palemoon that yield up EXIF data? (btw palemoon-28.0.0 is very stable). Here are some random points of interest,should your 2D images lead to 3D and beyond; here's a good intro:: https://www.prusaprinters.org/photogrammetry-3d-scanning-just-phone-camera/ Here is the latest read on mixed reality:: https://software.intel.com/en-us/blogs/2018/06/18/siggraph-2018-the-state-of-photogrammetry-in-real-time-graphics And if intel machines get 'out of control' well, we'll just have to jolt the some electrons with odd_spin:: https://github.com/ptresearch/IntelTXE-PoC All of this on gentoo? Sure, that's why I'm working on Hybrid-heterogeneous HPC gentoo clusters. But I'm AMD_Radeon_arm64 open source centric with my work. I'd be most appreciated if anyone can add more detail, list of FOSS codes, or other related packages and details. hth, James
Re: [gentoo-user] Firefox and VPN, plus security in generla
t to steal the secret of running car engines on water, know that you > > have nothing worth stealing in your secret lab? > > Well, I'm sure a lot can be told by the fact that I'm on a basic home > DSL account. I'm not on J. B. Blows secret services network. Now if I > had a super fast connection that had something interesting in the name, > then I could see someone peeking around and thinking, let's go break > into this network because he has some neat stuff to steal. Basically, > I'm not NSA.gov. ;-) Although, it would be odd but funny to read about > the NSA being hacked since they are the ones nosing into everyone else's > stuff. o_O Malicious hackers and state-actors scan all networks for victims. You may have no data of interest, but many hackers wouldn't mind adding your PC to their herd of botnets. > >> I'm not interested in a NSA based hardened install here, just reasonably > >> secure. > >> > >> Basically, I'm just wanting to make sure I'm reasonably secure here. > >> > >> Dale > >> > >> :-) :-) > > > > I guess you are reasonably secure, if by secure you mean protecting your > > LAN from unwanted penetration and you have a firewall configured on the > > Linksys, your PC's are NAT'ed and finally you have a firewall configured > > on your Gentoo PCs. However, being secure is a relative term and in your > > case ill defined. > There is a website somewhere out there that scans to see if a puter can > be seen or not. I've ran it before and it always gives me a clean bill > of health. Basically, the only port it sees is the one it is using to > do the test. Sort of hard to break into something they can't see but > I'm sure there is some hacker out there somewhere that could get around > that too. Security by obscurity, which is what the GRC 'Shields Up' port scan website proposes, offers no security at all. Don't get me wrong, S Gibson has set up a really good marketing enterprise at grc.com and made tons of money by spreading FUD. In the days of MSWindows 98 when ports and shared folders were inadvertently left open to the Internet with no firewalls in-between, port stealth was one desperate measure to increase security. However, the fact a port may not respond to a probe does not mean in any way that the port is not vulnerable to attack. Thankfully, I don't think many of us are using MSWindows 98 directly connected to the Internet these days. ;-) > I'm not going to dream about being as secure as a bank or > something. It's not reasonable to think I could do that. Hmm ... I wouldn't be that sure. Gentoo well configured is pretty secure and does not use RC4 ciphers or allows the connections to be degraded to lower strength ciphers like some banks do. In addition, I hope you have not outsourced responsibility for your own network's security to some underpaid drone in a 3rd world country, as your bank probably has. > I just want > to be reasonably secure given what I can reasonably do. I've had folks > tell me that DSL is more secure than cable service. I've also read that > having a router added into the mix also helps, since it is one more step > they have to make. Hopefully that is enough. OK, we're back into discussions that may have held true back in 1998 Cable modems operated as a node exposing local users connections to each other. You used to be able to connect to a neighbour's MSWindows 98 PC and browse his files. These days cable nodes implement DOCSIS 3.0 or 3.1 spec. which includes encryption between CMTS and modem. In addition, most modern cable modems also offer NAT routing. So the security of consumer LANs is the same with your typical DSL router. > I've been running Linux for over a decade. So far, I've never had > anyone hack into anything here. How would *you* know? ;-) > I use Lastpass to handle my passwords > and use a pretty secure master password. I just try to do the things I > can to make it at least difficult. If someone wants to go to the > trouble to break in to find out that I'm subscribed on a bunch of Linux > mailing lists, well, they deserve what they get. ROFL > > Thanks. > > Dale > > :-) :-) -- Regards, Mick signature.asc Description: This is a digitally signed message part.