Responsively App is a free and open source dev tool for responsive web development, available for Linux, Microsoft Windows and macOS.
Source: LXer – Responsively App Is A Browser For Faster Responsive Web Development (FOSS)
Monthly Archives: November 2021
How to Create Organizational Units (OU) and Enable GPO (Group Policy) in Zentyal – Part 3
After my previous two tutorials on installing, basic configurations and remotely accessing Zentyal PDC from a Windows-based node, it’s time to apply some degree of security and configurations on your users and computers that are joined onto your domain through creating Organizational Units (OU) and enabling GPO (Group Policy).
The post How to Create Organizational Units (OU) and Enable GPO (Group Policy) in Zentyal – Part 3 appeared first on Linux Today.
Source: Linux Today – How to Create Organizational Units (OU) and Enable GPO (Group Policy) in Zentyal – Part 3
Princeton Team Disables Long-Targeted Gene Behind Spread of Major Cancers
An anonymous reader writes: The mysterious ways cancer spreads through the body, a process known as metastasis, is what can make it such a difficult enemy to keep at bay. Researchers at Princeton University working in this area have been tugging at a particular thread for more than 15 years, focusing on a single gene central to the ability of most major cancers to metastasize. They’ve now discovered what they describe as a “silver bullet” in the form of a compound that can disable this gene in mice and human tissue, with clinical trials possibly not too far away.
This discovery has its roots in 2004 research in which Princeton scientists identified a gene implicated in metastatic breast cancer, called metadherin, or MTDH. A 2009 paper by cancer biologist Yibin Kang then showed the gene was amplified and produced abnormally high levels of MTDH proteins in around a third of breast cancer tumors, and was central to not just the process of metastasis, but also the resistance of those tumors to chemotherapy. Subsequent research continued to shed light on the importance of the MTDH gene, demonstrating how it is critical for cancer to flourish and metastasize. Mice engineered to lack the gene grew normally, and those that did get breast cancer featured far fewer tumors — and those tumors that did form didn’t metastasize. This was then found to be true of prostate cancer, lung cancer, colorectal cancer, liver cancer and many other cancers.
The crystal structure of MTDH shows the protein has a pair of protrusions likened to fingers, which interlock with two holes in the surface of another protein called SND1. This is “like two fingers sticking into the holes of a bowling ball,” according to Kang, and the scientists suspected if this intimate connection could be broken, it could go a long way to dampening the harmful effects of MTDH. “We knew from the crystal structure what the shape of the keyhole was, so we kept looking until we found the key,” Kang says. The team spent two years screening for the right molecules to fill these holes without any great success, until they landed on what they say is a “silver bullet.” The resulting compound plugs these voids and prevents the proteins from interlocking, with profound anti-cancer effects that resemble those seen in the MTDH-deficient mice from their earlier work. “The scientists say that MTDH assists cancer in two primary ways, by helping tumors endure the stresses of chemotherapy and by silencing the alarm that organs normally sound when a tumor invades them,” adds New Atlas. “By interlocking with the SND1 protein, it prevents the immune system from recognizing the danger signals normally generated by cancerous cells, and therefore stops it from attacking them. The team is now working to refine the compound, hoping to improve its effectiveness in disrupting the connection between MTDH and SND1 and lower the required dosage. [T]hey hope to be ready for clinical trials on human patients in two to three years.”
The research has been published across two papers in the journal Nature Cancer.
Read more of this story at Slashdot.
Source: Slashdot – Princeton Team Disables Long-Targeted Gene Behind Spread of Major Cancers
Can Rust save the planet? Why, and why not
Here at a depleted AWS Re:invent in Las Vegas, Rust Foundation chairwoman Shane Miller and Tokio project lead Carl Lerche made the case for using Rust to minimize environmental impact, though said its steep learning curve made the task challenging.
Source: LXer – Can Rust save the planet? Why, and why not
How to Hash Passwords in Linux
Passwords should never be stored as plain text. Whether we are talking about a web application or an operating system, they should always be in the hash form (on Linux, for example, hashed passwords are stored in the /etc/shadow file). Hashing is the process through which, by the use of complex algorithms, a password is turned into a different string. Learn how to hash passwords in Linux here.
The post How to Hash Passwords in Linux appeared first on Linux Today.
Source: Linux Today – How to Hash Passwords in Linux
Using SlickStack to Install WordPress Automatically on Ubuntu 20.04
SlickStack is essentially a collection of scripts for quickly and easily installing WordPress, with Nginx as a web server, on Ubuntu LTS.
It aims at making it easier for users to deploy lightweight, fast and secure WordPress websites, and guides users and helps them secure their server during the installation process.
In this article, we’ll go over how to use SlickStack to install WordPress on a server running Ubuntu 20.04 LTS, as well as give you a basic overview of some of its options.
The post Using SlickStack to Install WordPress Automatically on Ubuntu 20.04 appeared first on Linux Today.
Source: Linux Today – Using SlickStack to Install WordPress Automatically on Ubuntu 20.04
Right-Wing Group Wants Bobby Kotick Removed From Coca-Cola's Board
The National Legal and Policy Center, a right-wing organisation that “promotes ethics in public life”, has written to Coca-Cola Chairman and CEO James Quincey asking that he “immediately seek the resignation” of besieged Activision Blizzard CEO Bobby Kotick from the company’s board of directors, on which Kotick also…
Source: Kotaku – Right-Wing Group Wants Bobby Kotick Removed From Coca-Cola’s Board
Over 300,000 Android Users Have Downloaded These Banking Trojan Malware Apps, Say Security Researchers
Over 300,000 Android smartphone users have downloaded what turned out to be banking trojans after falling victim to malware that has bypassed detection by the Google Play app store. ZDNet reports: Detailed by cybersecurity researchers at ThreatFabric, the four different forms of malware are delivered to victims via malicious versions of commonly downloaded applications, including document scanners, QR code readers, fitness monitors and cryptocurrency apps. The apps often come with the functions that are advertised in order to avoid users getting suspicious. In each case, the malicious intent of the app is hidden and the process of delivering the malware only begins once the app has been installed, enabling them to bypass Play Store detections.
The most prolific of the four malware families is Anatsa, which has been installed by over 200,000 Android users — researchers describe it as an “advanced” banking trojan that can steal usernames and passwords, and uses accessibility logging to capture everything shown on the user’s screen, while a keylogger allows attackers to record all information entered into the phone. […] The second most prolific of the malware families detailed by researchers at ThreatFabric is Alien, an Android banking trojan that can also steal two-factor authentication capabilities and which has been active for over a year. The malware has received 95,000 installations via malicious apps in the Play Store. […] The other two forms of malware that have been dropped using similar methods in recent months are Hydra and Ermac, which have a combined total of at least 15,000 downloads. ThreatFabric has linked Hydra and Ermac to Brunhilda, a cyber-criminal group known to target Android devices with banking malware. Both Hydra and Ermac provide attackers with access to the device required to steal banking information. ThreatFabric has reported all of the malicious apps to Google and they’ve either already been removed or are under review.
Read more of this story at Slashdot.
Source: Slashdot – Over 300,000 Android Users Have Downloaded These Banking Trojan Malware Apps, Say Security Researchers
Google Must Turn Over Docs Connected to Secret Anti-Union Campaign, Judge Rules
As part of an ongoing investigation involving potentially unlawful retaliation against workers involved in labor activism, Google must turn over a slew of documents connected to a stealthy anti-union campaign it conducted back in 2019, a National Labor Review Board judge has ordered.
Source: Gizmodo – Google Must Turn Over Docs Connected to Secret Anti-Union Campaign, Judge Rules
Why PHP’s Foundation Matters
The PHP Foundation is an effort by 10 key PHP-dependent vendors to assure adequate funding to keep the popular scripting language viable.
The post Why PHP’s Foundation Matters appeared first on Linux Today.
Source: Linux Today – Why PHP’s Foundation Matters
Browser Extension Shows How Many Brands On Amazon Are Actually Just Amazon
A new browser extension promises to show you which products in your Amazon search results are sold by brands that are either owned by or are exclusive to Amazon, giving you a better idea of who’s selling what you’re buying. The Verge reports: It’s called Amazon Brand Detector, and it uses a list of Amazon brands created by The Markup, along with filters and other techniques (detailed here) to detect and highlight products that are a part of Amazon’s Our Brands program. The Markup created this extension after its investigation into how Amazon ranks its in-house brands in search results and says the tool (available for Chrome-like browsers and Firefox) is designed to make searches more transparent. When we tested it, it obviously highlighted Amazon Basics and Essentials products, but it also drew attention to results that were otherwise indistinguishable from ones not affiliated with Amazon: a dog leash labeled as being made by Panykoo, socks by Teebulen, a sweater by Ofeefan.
While Amazon marked some of those results as “featured from our brands,” that wasn’t the case for all of them. That advisory text is also small and grey, making it easy to miss if you’re casually browsing (especially since there may not be any notice of the affiliation on the actual product page), and it didn’t show up on every result the tool highlighted. Amazon isn’t necessarily shadowy about these brands: it has a page that lists its “private and select exclusive brands,” many of which have legit-sounding names: Happy Belly, Wag, Nature’s Wonder. Some are private labels owned by Amazon, where some are “curated selections” sold exclusively on Amazon but not necessarily operated by the company. According to The Markup, the extension “does not collect any data” and should be compatible with other extensions.
Read more of this story at Slashdot.
Source: Slashdot – Browser Extension Shows How Many Brands On Amazon Are Actually Just Amazon
An Introduction To Apache Cassandra
In this guide, we will discuss what is Cassandra, the Market leading NoSQL DB, Cassandra architecture, key components and and its use cases in detail.
Source: LXer – An Introduction To Apache Cassandra
How to Find the Default Gateway IP in Linux
In this guide, you will learn about routes, static routes, and default gateway IPs. Specifically, you will learn how to find the default gateway IP in Linux.
The post How to Find the Default Gateway IP in Linux appeared first on Linux Today.
Source: Linux Today – How to Find the Default Gateway IP in Linux
So Dune and Star Wars' Filmmakers Walk Into a Bar…
At this point, most of us can agree that Denis Villeneuve made the impossible possible. He took Frank Herbert’s legendary sci-fi book Dune and made it into popular, digestible entertainment, a feat no one thought would ever happen. And yet along the way he had multiple obstacles, including one from a galaxy far, far…
Source: Gizmodo – So Dune and Star Wars’ Filmmakers Walk Into a Bar…
'Massive' Startup Wants To Rent Your Spare Compute Power To Pay For Apps
What if users could pay for apps or services not with money or attention, but with their spare compute power? A startup called “Massive” is working to take this concept “into the modern world as an alternative to charging users or pounding them with advertisements to generate revenue,” writes TechCrunch’s Alex Wilhelm. From the report: Massive announced an $11 million round this morning, led by Point72 Ventures with participation from crypto-themed entities, including CoinShares Ventures and Coinbase Ventures. Several angels also participated in the funding event. The model is interesting, and Massive’s funding round is an indication that it has found some market traction. So, we get the company on the horn to learn more.
Massive co-founder and CEO Jason Grad described the startup’s work as something akin to an Airbnb or Turo for users’ computers, comparing its service to some of the more popular consumer-sharing startups that folks already know. It’s a reasonable comparison. Some 50,000 desktop computer users — nodes, in the company’s parlance — have opted into its service. Which is white hat, it goes without saying. Given that Massive is asking for compute power, it will have constant work to do to ensure that it is a good steward of user trust and partner selection; no one wants their spare CPU cycles to go to something illegal. The company has a good early stance toward caring for its nascent compute exchange, with a hard requirement of getting users to opt into its service before joining.
To start, Massive is working with crypto-focused companies. They have an obvious need for compute power, and the work they execute — running blockchain calculations — is monetized through block rewards and other fees, making them easy choices for partnerships. You can now see why the company’s investor list includes a number of crypto-focused venture capital firms. The startup’s goal is broader, however. It wants to build a two-sided marketplace for compute power, Grad explained. That means lots more users offering up a slice of their computing power, future acceptance of mobile devices, and a broader partner list. Part of the company’s perspective is rooted in the belief that the dominant business models of the internet today are lacking. “Shit,” to quote Grad directly.
Read more of this story at Slashdot.
Source: Slashdot – ‘Massive’ Startup Wants To Rent Your Spare Compute Power To Pay For Apps
CUPS 2.4.0 Printing System Released, Check Out What’s New
The Common UNIX Printing System (CUPS) is a cross-platform printing solution used on many different Linux distros. Now the OpenPrinting project has just released CUPS 2.4.0 formed without Apple’s participation, which has since 2007.
The post CUPS 2.4.0 Printing System Released, Check Out What’s New appeared first on Linux Today.
Source: Linux Today – CUPS 2.4.0 Printing System Released, Check Out What’s New
Alder Lake, Kernel Optimizations & Steam Deck Happenings That Excited Linux Fans
With another month of the pandemic in the books, here is a look back at the exciting Linux and open-source highlights that came about during the course of November. This month was particularly exciting for new Linux kernel developments, never-ending work on open-source graphics drivers, the much anticipated launch of Intel 12th Gen “Alder Lake”, gamers continuing to clamor for the Steam Deck, and much more…
Source: Phoronix – Alder Lake, Kernel Optimizations & Steam Deck Happenings That Excited Linux Fans
Stare into the abyss of a swirling black hole with this LED monolith installation

Enlarge / Screengrab of Jesse Woolston’s latest piece, The Dynamics of Flow, debuting at Art Basel Miami Beach later this week. (credit: Jesse Woolston)
Multimedia artist, composer, and sound designer Jesse Woolston has had a recurring dream for much of his life about encountering a black hole, “falling inward, and waking up terrified.” (Who wouldn’t wake up terrified?) According to the artist, those dreams have always been a reminder to him of “nature’s terrifying awe.” Now, Woolston has channeled that emotional experience into a new multimedia installation, The Dynamics of Flow—part of an LED monolith exhibit debuting later this week at Art Basel Miami Beach. Bonus: it’s also an NFT.
My second #NFT, released on the 28th, will be part of an LED monolith installation built for the week of Art Basel.
Throughout my life, I’ve had the same dream, being confronted with a blackhole and falling inward. This installation and NFT communicates my experience.
pic.twitter.com/Kw93btpXhq
— Jesse Woolston (@jessewoolston) November 27, 2021
Woolston has long merged his artistic work with his love of science, aiming to “recontextualize” physics and art both visually and with sound/music. “I see scientists almost as magicians who are fantastic at understanding the world,” he told Ars. “I consider myself someone who loves to communicate the laws of the universe and what it means to be human.” He’s worked with astrophysicists at Cornell University who hunt for exoplanets, for instance, and wrote the music for a theatrical dance performance inspired by Washington State University research on glacier dynamics in Greenland. In recent years, his focus has been on building large installations that combine sound and visuals in interesting ways.
A couple of years ago, Woolston created an art installation for the Museum of the Moving Image in New York City with Levi Patel that made use of haptics technology. The tech is called Music: Not Impossible (M:NI), and I wrote about it in 2018. M:NI is designed to provide deaf and hearing users alike with a “vibrotactile” concert experience.
Read 13 remaining paragraphs | Comments
Source: Ars Technica – Stare into the abyss of a swirling black hole with this LED monolith installation
The Virtual Phone Farms Scammers Use To Set Up Fake Accounts
An anonymous reader quotes a report from Motherboard: When a scammer wants to set up an account on Amazon, Discord, or a spread of other online services, sometimes a thing that stands in their way is SMS verification. The site will require them to enter a phone number to receive a text message which they’ll then need to input back into the site. Sites often do this to prevent people from making fraudulent accounts in bulk. But fraudsters can turn to large scale, automated services to lease them phone numbers for less than a cent. One of those is 5SIM, a website that members of the video game cheating community mention as a way to fulfill the request for SMS verification.
Various YouTube videos uploaded by the company explain how people can use its service explicitly for getting through the SMS verification stage of various sites. The videos include instructions specifically on PayPal, Instagram, Facebook, Telegram, and dating site Plenty of Fish. Instagram told Motherboard it is concerned by sites that suggest people can use services to bypass Instagram’s measures to then abuse the platform. Instagram said it uses SMS verification to prevent the creation of fake accounts and to make account recovery possible. “We have many measures in place to protect against scripted account creation and block millions of fake accounts at registration every day,” an Instagram spokesperson said.
Some online services don’t allow users to perform SMS verification with VoIP numbers, presumably in an effort to mitigate against fraud. 5SIM’s numbers, however, are just like ordinary phone numbers, the site claims. When people buy 5SIM’s services, they must only use it for receiving texts related to an online account. “Different SMS will [be] rejected,” the website adds. 5SIM also offers an API to automate parts of the service. 5SIM’s rules say that customers are “Forbidden to use the service for any illegal purposes as well as not to take actions that harm the service and (or) third parties.” The website also includes a denylist of words that its service may block. In an email to Motherboard, 5SIM said: “5sim service is prohibited to use for illegal purposes. In cases, where fraudulent operations with registered accounts are detected, restrictions may be imposed on the 5sim account until the circumstances are clarified. 5sim is used by those who want to get a discount or bonus, webmasters, SMM specialists, owners of business for advertising and increasing business loyalty.”
Read more of this story at Slashdot.
Source: Slashdot – The Virtual Phone Farms Scammers Use To Set Up Fake Accounts
Twitch will use machine learning to catch ban-dodging trolls
Twitch is introducing a new machine learning feature to help streamers protect their channels from people attempting to avoid bans. Dubbed “Suspicious User Detection,” the tool will automatically flag individuals it suspects may be “likely” or “possible” ban dodgers.
In cases involving the former, Twitch will prevent any messages they send from showing up in chat. It will also identify those individuals for streamers and any mods helping them with their channel. At that point, they can decide if they want to ban that person. By default, possible repeat trolls can send messages in chat, but they too will be flagged by the system. Additionally, Twitch says creators have the option to prevent them from sending any messages in the first place.
“The tool is powered by a machine learning model that takes a number of signals into account — including, but not limited to, the user’s behavior and account characteristics — and compares that data against accounts previously banned from a Creator’s channel to assess the likelihood the account is evading a previous channel-level ban,” a Twitch spokesperson told Engadget when we asked about the signals the system uses to detect potential offenders.
While Twitch plans to turn on Suspicious User Detection for everyone, the tool won’t automatically ban users for streamers. That’s by design because it’s impossible to create a machine learning tool that is 100 percent accurate in every context. “You’re the expert when it comes to your community, and you should make the final call on who can participate,” the company said in a blog post. “The tool will learn from the actions you take and the accuracy of its predictions should improve over time as a result.”
The introduction of the tool follows a summer in which Twitch struggled to contain a phenomenon called “hate raids.” The attacks saw malicious individuals use thousands of bots to spam channels with hateful language. In many cases, they targeted creators from marginalized communities. Hate raids became such a frequent feature of the platform that some creators walked away from Twitch for a day in protest of the company’s lack of action.
Source: Engadget – Twitch will use machine learning to catch ban-dodging trolls