Despite supposedly having no data caps, the other day my provider interrupted my surfing with a message stating that I’d downloaded an “excessive amount” and should contact them to upgrade my plan. Interestingly, their website also doesn’t show any data caps or, for that matter, any plans for me to upgrade to.
I’m not real worried about it, but at the same time since I work full time remote I really need my intertoobs to work all the time. Then I remembered that the vacation rental we manage next door to me has internet that rarely gets used. Time to slap a wireless NIC on the server and push internet traffic through that router!
Doing so was easy. I had a halfway decent USB wireless laying around. I slapped it in, joined the next door wireless network, and then ran a route print:
The highlighted bit is the new NIC. Above it is the wired NIC connecting the server to my local network. You want the Metric on the NIC you want internet traffic flowing through to be the lowest. Luckily mine defaulted to that. If yours doesn’t do that you can manually set the Metric by navigating to the Advanced properties of the Network Adapters:
After that I simply removed the Gateway address from the properties of my wired LAN access NIC and voila – all my intertoobs were coming from next door while my LAN still had full access to my server. In order to double check I logged into my router and disabled internet traffic for the server IP address.
What’s happening here is, because the notes demand to use Segoe Print as the font, you’re changing what font Segoe Print actually is. Replace the .ttfs with fonts of your choice.
There are also a myriad of shortcuts for modifying existing note text:
Ctrl+B – Bold text Ctrl+I – Italic text Ctrl+T – Strikethrough Ctrl+U – Underlined text Ctrl+Shift+L – Bulleted (press once) or Numbered (press twice) list Ctrl+Shift+> – Increased text size Ctrl+Shift+< – Decreased text size Ctrl+A – Select all Ctrl+Shift+A – Toggles all caps Ctrl+L – Left aligns text Ctrl+R – Right aligns text Ctrl+E – Centers text Ctrl+Shift+L – Small Alpha list (3rd), Capital Alpha list (4th), small roman (5th), Capital roman (6th) Ctrl+1 – Single-space lines Ctrl+2 – Double-space lines Ctrl+5 – Set 1.5-line spacing Ctrl+= – Subscript Ctrl+Shift++ – Superscript
For reasons I won’t get into here, the EFF has decided for now not to support Pale Moon, which is my current browser of choice (sideplug: Like Firefox but tired of it gobbling all your resources and crashing? Pale Moon my friend). The inability to install HTTPS Everywhere nearly had me leaving Pale Moon until I discovered that there’s a fork of it out there that works! So use Pale Moon, and install Encrypted Web (and uBlock Origin).
I’ve read some pro-capitalist (anti-socialist?) rants lately, some penned by people roughly half my age, that have disappointed me in their shortsightedness. I’ve also read some writings by people like Stephen Hawking – who recently said we should not fear artificial intelligence, but rather capitalism – and a raft of economists, technologists and anthropologists – who are predicting a near future of technologically driven job scarcity – that lend credence to my disappointment. You don’t have to like it, but you’d be a fool to ignore it: we’re on the precipice of a future with a very different economic landscape, and more likely than not – especially if you’re young – you’re going to be in big fucking trouble if your value system doesn’t change, and fast.
Trust me. I know. Because, on a very small scale, I’m one of those people making you obsolete. Continue reading →
I’m using some older Windows programs – abandonware stuff by this point – on Ubuntu Mate via Wine. I needed to install some custom fonts for these programs to use and had a bit of a time finding straightforward instructions on doing so. Turns out it’s easy. The fonts I needed are TrueType, so that’s all I’ve tested with.
Navigate to home/YOURUSERHOME/.wine/drive_c/windows/fonts
You will have to enable hidden files in order to see the .wine directory, and if you haven’t done so already you’ll need to open the fonts directory as administrator (from the windows directory right click the fonts directory and choose Open as Administrator). Dump your font(s) into that directory. Then open a prompt and enter:
sudo fc-cache -fv
This will rebuild the font information caches for fontconfig system. Then you should be good to go.
“Some index files failed to download.” That’s the error I got upon running apt-get update, after having Ubuntu Mate notify me that some of my updates are, er, out of date. The indexes that failed to download were related to Flux, which I really liked having on my Windows machines. Turns out that, as of this writing, the repository of Vivid Vervet (Ubuntu 15) for Flux ain’t there. Take a look for yourself and see. I suppose I could install an older version, but since I wasn’t interested in getting into any compatibility issues I decided to bail on Flux for now.
But I couldn’t uninstall Flux. It isn’t installed. I need to get rid of the repository information. You’d think that would be as simple as remove-apt-repository blah blah, since adding it is a simple add-apt-repository, but nope. There’s no remove-apt-repository. Ultimately I opened the path /etc/apt/sources.list.d as admin, and removed the associated list and save files. Reran apt-get update and voila – both the errors and the nag referring to out of date updates disappeared.
Bad news. A serious flaw in TrueCrypt has been found that potentially allows full system compromise. The worse news? There’s no truly trustworthy TC successor for Windows out there in the wilds so far. Microsoft and Symantec both offer encryption solutions, but surely they’re rife with back doors. VeraCrypt is a fork of TC, but so far there’s nothing to generate any confidence that it too isn’t compromised.
The good news, I suppose, is that so far it appears that TrueCrypt on Linux doesn’t have this newly found flaw. Also, it seems this flaw requires the machine to be on and in Windows. In other words, if your fully disk encrypted machine is powered down, or your drives are removed or are external and the machine isn’t with them, your data remains safe. Cold comfort, really.
We collect non-personal data to make money from our free offerings so we can keep them free, including: Advertising ID associated with your devices Browsing and search history, including meta data; Internet service provider or mobile network you use to connect to our products; and Information regarding other applications you may have on your device and how they are used. Sometimes browsing history or search history contains terms that might identify you. If we become aware that part of your browsing history might identify you, we will treat that portion of your history as personal data, and will anonymize this information. We may also aggregate and/or anonymize personal data we collect about you. For instance, although we would consider your precise location to be personal data if stored separately, if we combined the locations of our users into a data set that could only tell us how many users were located in a particular country, we would not consider this aggregated information to be personally identifiable.
That’s a huge italicized if. Basically a get out of jail free card. IF we become aware that we’re collecting identifying data. If we don’t, well, sorry. We weren’t aware.
The other day my neighbor headed to a United Airlines affiliated site in Chrome to book a trip and was greeted with “Server has a weak ephemeral Diffie-Hellman public key.” Full stop. She could not continue on to the site. This is occurring because there is an attack in the wild that takes advantage of a flaw in the Transport Layer Security protocol (a fancy way of saying the supposedly secure way in which a web server communicates to your browser) in order to watch your traffic. This is called a Man in The Middle Attack. Essentially it inserts itself between you and your destination and logs your conversation. You can read more about this here.
The solution is, unfortunately, out of your hands. Your browser isn’t broken – The site you’re trying to get to is. And, as evidenced by it affecting a United Airlines site, there are some heavy hitters who are vulnerable. Any site that’s running 1024 bit or less encryption needs to upgrade to 2048 to close the hole.
But in the meantime, what if you really, really need to get to that site? I’d tell you to try to contact the site owners and tell them to get it together, but realistically that’s not so easy (can you imagine calling United’s customer service and saying to the phone jockey who answered “Hey, y’all need to upgrade your public keys on your site because currently it’s vulnerable to the Logjam attack and any decent browser isn’t allowing your site to resolve.” Yeah, you’ll get traction there). So how do you get to the site? So far there doesn’t appear to be a way to tell Chrome to continue. You can try switching from HTTPS to HTTP, but most likely you’re hitting a login page and will be forced back to HTTPS (and the error). You can, however, weaken Firefox to allow navigation on these sites. Open a new tab and in the address field enter:
This opens the browser’s sekrit settings. Get past the warning, and then locate these two settings:
By default these are set to True. Change them to False and you’ll be able to hit the effected site. I STRONGLY recommend only doing this on a site you absolutely trust, and only in situations where there’s absolutely no other recourse, and I recommend changing these back to True as soon as you’re done on that site.
Surely you’ve already read that Windows 10 includes some pretty disappointing user tracking baked into it. Microsoft is also pushing this tracking down to its Windows 7 and 8 operating systems.
Aside: I get the Win 10 thing. It’s free. Do what you want with your free operating system. But quietly inserting anti-privacy shit into operating systems that people have already paid for? Ludicrous. Offensive. Ridiculous. It’s prompted me to finally get off my ass and move all the machines I can off of Windows and onto Linux, for good.
Anyway, yeah, MS is pushing this stuff into your operating system without really giving you any indication. The current list of updates that should trouble you are as follows:
In fact, you can save the above to a .bat file and run it. This takes them off, but unfortunately doesn’t prevent them from presenting themselves for install in the future. To fix that you’ll have to head to Windows Update, let it scan what you’re missing, and then go through that list hunting for each of these. When you come across one, right click it and choose to hide it.
This is the list for now… I sincerely doubt this is where it will end, however. Have you tried Linux lately?