FLOS: The future of Linux? FLOS: The future of Linux?
To me, the core of a UNIX system is a philosophical matter. To quote Mike Gancarz’s The UNIX Philosophy from 1994, UNIX has 9 paramount precepts: Small is beautiful. Make each program do one thing well. Build a prototype as soon as possible. Choose portability over efficiency. Store data in flat text files. Use software leverage to your advantage. Use shell scripts to increase leverage and portability. Avoid captive user interfaces. Make every program a filter. FLOS is a nearly diametrically opposed design, with design concepts like the following: FLOS avoids scripts, and prefers to split tasks into compiled logic interacting with logic-less configuration files. FLOS prioritizes ease of machine manipulablity over human manipulablity. The components of FLOS communicate over D-Bus rather than sockets and pipes. FLOS is built on a core of monolithic programs which attempt to synergisticly manage multiple complex components. FLOS leverages features specific to Linux and ignores portabili

Learning Vim in 2014: Search

Learning Vim in 2014: Search
One useful behavior of substitute to be aware of: If you leave the search expression blank, it reuses your last search. So if you’ve been playing around with a regex to get the right expression, once you get it right you can type :%s///g, and it will replace all instances, without forcing you to retype your complicated regex. Finally, it’s worth noting that search plays nicely with Vim’s composable actions, and you can use it as a motion command with y, c, d or other actions. For instance d/foo will delete all text up to the next occurence of foo in the document. y?foo will yank all text backwards to the previous occurence of foo in the document.

Overview | piBeacon – DIY iBeacon with a Raspberry Pi | Adafruit Learning System

Overview | piBeacon – DIY iBeacon with a Raspberry Pi | Adafruit Learning System
This learning guide will show you how you can take your Raspberry Pi (or almost any Linux-based device with a bit of poking and prodding) and turn it into an Beacon node using our Bluetooth 4.0 USB Module and the open source Bluez stack. Inside this field, you need the following values: ID (uint8_t) – This will always be 0x02 Data Length (uint8_t) – The number of bytes in the rest of the payload = 0x15 (21 in dec) 128-bit UUID (uint8_t[16]) – The 128-bit ID indentifying your company/store/etc Major (uint16_t) – The major value (to differentiate individual stores, etc.) Minor (uint16_t) – The minor value (to differentiate nodes withing one location, etc.) TX Power (uint8_t) – This value is used to try to estimate distance based on the RSSI value

Schneier on Security: Choosing Secure Passwords

Schneier on Security: Choosing Secure Passwords
The attacker will feed any personal information he has access to about the password creator into the password crackers. A good password cracker will test names and addresses from the address book, meaningful dates, and any other personal information it has. Postal codes are common appendages. If it can, the guesser will index the target hard drive and create a dictionary that includes every printable string, including deleted files. If you ever saved an e-mail with your password, or kept it in an obscure file somewhere, or if your program ever stored it in memory, this process will grab it. And it will speed the process of recovering your password. Last year, Ars Technica gave three experts a 16,000-entry encrypted password file, and asked them to break as many as possible. The winner got 90% of them, the loser 62% — in a few hours. It’s the same sort of thing we saw in 2012, 2007, and earlier. If there’s any new news, it’s that this kind of thing is getting easier faster than people Gunnar Heinsohn – Käfig saubermachen und anderen Vogel hineinsetzen! Gunnar Heinsohn – Käfig saubermachen und anderen Vogel hineinsetzen!
2013 erreicht China trotz höherer Löhne sowie einer 16-prozentigen Yuan-Verteuerung gegenüber dem Dollar (2008 – 2013) über 20% der globalen Hightech-Exporte, obwohl nur 11% aller Exporte auf das Reich der Mitte entfallen (Kuijs; Royal Bank of Scotland). Doch 82% der ambitionierten Güter werden von Töchtern westlicher und ostasiatischer Firmen oder in Partnerschaft mit ihnen erbracht (Xing, “The People’s Republic of China’s High-Tech Exports: Myth and Reality”, Asian Development Bank Institute, Report 357, April 2102). Das wird außerhalb des Landes mit einer gewissen Erleichterung als Schwäche gedeutet, daheim aber als Herausforderung angenommen, die man schon bestehen werde. Immerhin vertrauen die fremden Hightech-Firmen auf Chinas Qualifikationen und tätigen ihre anspruchsvollen Investitionen nicht etwa auf den Philippinen, wo man durch das lateinische Alphabet sowie westliche Sprachen enorme Vorteile haben sollte. Und doch entfallen schon vor einem halben Jahrzehnt 44% aller auslän Edward Snowden: The Untold Story | Threat Level Edward Snowden: The Untold Story | Threat Level
I confess to feeling some kinship with Snowden. Like him, I was assigned to a National Security Agency unit in Hawaii—in my case, as part of three years of active duty in the Navy during the Vietnam War. Then, as a reservist in law school, I blew the whistle on the NSA when I stumbled across a program that involved illegally eavesdropping on US citizens. I testified about the program in a closed hearing before the Church Committee, the congressional investigation that led to sweeping reforms of US intelligence abuses in the 1970s. Finally, after graduation, I decided to write the first book about the NSA. At several points I was threatened with prosecution under the Espionage Act, the same 1917 law under which Snowden is charged (in my case those threats had no basis and were never carried out). Since then I have written two more books about the NSA, as well as numerous magazine articles (including two previous cover stories about the NSA for WIRED), book reviews, op-eds, and documenta