Putting LineageOS on an abandoned phone to get continued Android updates

What do you do with your cell phone that still works cause you are someone that takes good care of their tech and the company doesn’t support it with security updates? Well, there’s a solution that involved Open Source. It used to be call CyanogenMod, it was reborn as LineageOS. Find your device on their wiki https://wiki.lineageos.org/devices/ and follow the Install recipe laid out after you have installed the Android adb tools to your appropriate Operating System. You can do this from any operating system platform. Windows, Mac, and Linux.

.dec

Advertisements

Open Source on OS X and more…

Check out InkScape as an alternative to Adobe Illustrator or maybe you’re a previous Macromedia Freehand user?

Krita is another Open Source painter style program.

Krita is a professional FREE and open source painting program. It is made by artists that want to see affordable art tools for everyone.concept art
texture and matte painters
illustrations and comics

A few links, and thoughts…

Forked this Access Management project for use with our projects.

https://github.com/digitalmystic/OpenAM (GITHub)

http://med.stanford.edu/news/all-news/2019/05/synthetic-biology-used-to-target-cancer-cells.html


https://medium.com/@ngoeke/how-to-identify-your-true-friends-701c01560b7

https://www.pppl.gov/news/2019/04/artificial-intelligence-accelerates-efforts-develop-clean-virtually-limitless-fusion

https://hyper.is/blog

Adding some teeth to your server…

ever wonder how administrators of high value target technology (HVTT) users (aka Enterprises) fend off their attackers?

Helpful tools, like Denyhosts, Fail2Ban, and others help streamline the management and security of the systems they are responsible for

https://serverfault.com/questions/128962/denyhosts-vs-fail2ban-vs-iptables-best-way-to-prevent-brute-force-logons/632254#632254  

A combination of DenyHosts, fail2ban and creating your own server that you perform post-log-inspection on and update a database of the output of fail2ban and denyhosts. As well as using firewalls properly, as per Marcus Ramen’s original creation of the “firewall”. Deny All, Trust few, Filter everyone, Advanced Port Wizardry (ie. Port Knocking, which is actually listed in the thread above and I am not able to upvote it at this time. So I thought I would add some insights.

Using a tool such as SNORT https://www.snort.org/ and since you’re using Python/C/ASM (OPS aka Optimal Programming Stack) and being a Pragmatic Programmer #pragmaticprogrammer you have a broad range of skills, abilities with a pro-active preventative style where you enjoy planning ahead for future flexibility of your scalability. see Pythonic Styles like the Zen of Python.

.DEC
I love the Zen of Python.

https://www.python.org/dev/peps/pep-0020/

The Zen of Python

Beautiful is better than ugly.
Explicit is better than implicit.
Simple is better than complex.
Complex is better than complicated.
Flat is better than nested.
Sparse is better than dense.
Readability counts.
Special cases aren’t special enough to break the rules.
Although practicality beats purity.
Errors should never pass silently.
Unless explicitly silenced.
In the face of ambiguity, refuse the temptation to guess.
There should be one– and preferably only one –obvious way to do it.
Although that way may not be obvious at first unless you’re Dutch.
Now is better than never.
Although never is often better than right now.
If the implementation is hard to explain, it’s a bad idea.
If the implementation is easy to explain, it may be a good idea.
Namespaces are one honking great idea — let’s do more of those!


https://www.addictivetips.com/net-admin/intrusion-detection-tools/ (see excerpt below)

Security is a hot topic and it has been for quite a while. Many years ago, viruses were the only concerns of system administrators. Viruses were so common that it led the way for an astounding range of virus prevention tools. Nowadays, barely anyone would think of running an unprotected computer. However, computer intrusion, or the unauthorized access to your data by malicious users, is the “threat du jour”. Networks have become the target of numerous ill-intentioned hackers which will go to great lengths to gain access to your data. Your best defense against these types of threats is an intrusion detection–or prevention–system. Today, we’re reviewing ten of the best free intrusion detection tools.

.DEC (More to come)

Mimblewimble: How a Stripped-Down Version of Bitcoin Could Improve… | Bitcoin Magazine

https://bitcoinmagazine.com/articles/mimblewimble-how-a-stripped-down-version-of-bitcoin-could-improve-privacy-fungibility-and-scalability-all-at-once-1471038001/

Older article from 2016

. dec

Open Source Business Model

is a phrase that has been thrown around at times and applies to many existing examples like RedHat, Cloudera and others.


If you’re thinking about starting a company, don’t let the tail wag the dog. Start with the question “how can I deliver value for customers” and work backward from that. Then piece together the open source components you’ll need for your ultimate solutions that deliver value and construct your software supply chain. At this point, you may decide, like Red Hat, that you want the benefits of collaborative development, or you may decide, like Cloudera, that you want at least some of that to be entirely under your control. The point is you can make that choice without the baggage of “let’s monetize ‘X’”. You’ll be much happier with your choice.

https://medium.com/@johnmark/open-source-business-models-considered-harmful-2e697256b1e3

Open Source Business Model, is discussed in a few places by a few authors and their position is that there is not one of “these” and I would suggest that their perspective is skewed by their pre-existing conditioning from their own experiences. I think there are many entrepreneurs that are working in and with Open Source in various ways.

Lots of interesting ideas none the less.

https://www.linux.com/blog/4-quadrants-open-source-entrepreneurship

Follow our affiliate link below:

Infrastructure planning: A professional’s perspective.

https://lethain.com/infrastructure-planning/

Will Larson’s Bio:

Will Larson

April 1, 2007.

Hi. I grew up in North Carolina, studied CS at Centre College in Kentucky, spent a year in Japan on the JET Program, and have been living in San Francisco since 2009 or so.

Since coming out here, I’ve gotten to work at some great companies, and some of them were even good when I worked there! Starting with Yahoo! BOSSDiggSocialCodeUber and now Stripe.

A long time ago, I also cofounded a really misguided iOS gaming startup with Luke Hatcher. We made thousands of dollars over six months, and spent the next six years trying to figure out how to stop paying taxes. It was a bit of a missed opportunity.

The very first iteration of Irrational Exuberance was created the summer after I graduated from college, and I’ve been publishing to it off and on since. Early on there was a heavy focus on Django, Python and Japan; lately it’s more about infrastructure, architecture and engineering management.

It’s hard to predict what it’ll look like in the future.

In his article, Will Larson (https://lethain.com/about/) discusses the complicated processes of “Infrastructure Planning” and communicates in a very clear and effective way, a lot of what is necessary for something very complex and simplifies it down to less details and less technical language for the lay person. I think his brilliance is in this. I hope I find a lot more of this as I surf the Internet.

Here’s a couple of opening paragraphs to give you a taste.

Technical infrastructure is never complete. System processes can always run with less overhead or be bin-packed onto fewer machines. Data can be retrieved more quickly and stored at a cheaper cost per terabyte. System design can broaden the gap between failure and user impact. Transport layers can be more secure.

The sheer variety of investable projects is overwhelming. There are always new technologies to adopt or finish adopting: Docker, Kubernetes, Envoy, GKE, HTTP/2, GraphQL, gRPC, Spark, Flink, Rust, Go, Elixir are just the beginning of your options. Add cloud vendor competition, and the rate of change is pretty staggering.

With such a broad problem domain filled with so many possible solutions, I’ve sometimes found it difficult to provide guidance for infrastructure teams to prioritize their work. Originally, I thought this was because I lacked depth in some facets, but I slowly came to realize it was equally difficult for the teams themselves to prioritize their own work: there were simply too many options.

Read more…

I think you will find his article a very solid source of information.

.dec

Follow our affiliate link below: