Putting LineageOS on an abandoned phone to get continued Android updates

What do you do with your cell phone that still works cause you are someone that takes good care of their tech and the company doesn’t support it with security updates? Well, there’s a solution that involved Open Source. It used to be call CyanogenMod, it was reborn as LineageOS. Find your device on their wiki https://wiki.lineageos.org/devices/ and follow the Install recipe laid out after you have installed the Android adb tools to your appropriate Operating System. You can do this from any operating system platform. Windows, Mac, and Linux.

.dec

Advertisements

Open Source on OS X and more…

Check out InkScape as an alternative to Adobe Illustrator or maybe you’re a previous Macromedia Freehand user?

Krita is another Open Source painter style program.

Krita is a professional FREE and open source painting program. It is made by artists that want to see affordable art tools for everyone.concept art
texture and matte painters
illustrations and comics

A few links, and thoughts…

Forked this Access Management project for use with our projects.

https://github.com/digitalmystic/OpenAM (GITHub)

http://med.stanford.edu/news/all-news/2019/05/synthetic-biology-used-to-target-cancer-cells.html


https://medium.com/@ngoeke/how-to-identify-your-true-friends-701c01560b7

https://www.pppl.gov/news/2019/04/artificial-intelligence-accelerates-efforts-develop-clean-virtually-limitless-fusion

https://hyper.is/blog

Adding some teeth to your server…

ever wonder how administrators of high value target technology (HVTT) users (aka Enterprises) fend off their attackers?

Helpful tools, like Denyhosts, Fail2Ban, and others help streamline the management and security of the systems they are responsible for

https://serverfault.com/questions/128962/denyhosts-vs-fail2ban-vs-iptables-best-way-to-prevent-brute-force-logons/632254#632254  

A combination of DenyHosts, fail2ban and creating your own server that you perform post-log-inspection on and update a database of the output of fail2ban and denyhosts. As well as using firewalls properly, as per Marcus Ramen’s original creation of the “firewall”. Deny All, Trust few, Filter everyone, Advanced Port Wizardry (ie. Port Knocking, which is actually listed in the thread above and I am not able to upvote it at this time. So I thought I would add some insights.

Using a tool such as SNORT https://www.snort.org/ and since you’re using Python/C/ASM (OPS aka Optimal Programming Stack) and being a Pragmatic Programmer #pragmaticprogrammer you have a broad range of skills, abilities with a pro-active preventative style where you enjoy planning ahead for future flexibility of your scalability. see Pythonic Styles like the Zen of Python.

.DEC
I love the Zen of Python.

https://www.python.org/dev/peps/pep-0020/

The Zen of Python

Beautiful is better than ugly.
Explicit is better than implicit.
Simple is better than complex.
Complex is better than complicated.
Flat is better than nested.
Sparse is better than dense.
Readability counts.
Special cases aren’t special enough to break the rules.
Although practicality beats purity.
Errors should never pass silently.
Unless explicitly silenced.
In the face of ambiguity, refuse the temptation to guess.
There should be one– and preferably only one –obvious way to do it.
Although that way may not be obvious at first unless you’re Dutch.
Now is better than never.
Although never is often better than right now.
If the implementation is hard to explain, it’s a bad idea.
If the implementation is easy to explain, it may be a good idea.
Namespaces are one honking great idea — let’s do more of those!


https://www.addictivetips.com/net-admin/intrusion-detection-tools/ (see excerpt below)

Security is a hot topic and it has been for quite a while. Many years ago, viruses were the only concerns of system administrators. Viruses were so common that it led the way for an astounding range of virus prevention tools. Nowadays, barely anyone would think of running an unprotected computer. However, computer intrusion, or the unauthorized access to your data by malicious users, is the “threat du jour”. Networks have become the target of numerous ill-intentioned hackers which will go to great lengths to gain access to your data. Your best defense against these types of threats is an intrusion detection–or prevention–system. Today, we’re reviewing ten of the best free intrusion detection tools.

.DEC (More to come)

Mimblewimble: How a Stripped-Down Version of Bitcoin Could Improve… | Bitcoin Magazine

https://bitcoinmagazine.com/articles/mimblewimble-how-a-stripped-down-version-of-bitcoin-could-improve-privacy-fungibility-and-scalability-all-at-once-1471038001/

Older article from 2016

. dec

Open Source Business Model

is a phrase that has been thrown around at times and applies to many existing examples like RedHat, Cloudera and others.


If you’re thinking about starting a company, don’t let the tail wag the dog. Start with the question “how can I deliver value for customers” and work backward from that. Then piece together the open source components you’ll need for your ultimate solutions that deliver value and construct your software supply chain. At this point, you may decide, like Red Hat, that you want the benefits of collaborative development, or you may decide, like Cloudera, that you want at least some of that to be entirely under your control. The point is you can make that choice without the baggage of “let’s monetize ‘X’”. You’ll be much happier with your choice.

https://medium.com/@johnmark/open-source-business-models-considered-harmful-2e697256b1e3

Open Source Business Model, is discussed in a few places by a few authors and their position is that there is not one of “these” and I would suggest that their perspective is skewed by their pre-existing conditioning from their own experiences. I think there are many entrepreneurs that are working in and with Open Source in various ways.

Lots of interesting ideas none the less.

https://www.linux.com/blog/4-quadrants-open-source-entrepreneurship

Follow our affiliate link below:

PolyglotPersistence

via PolyglotPersistence  (excerpt follows)

In 2006, my colleague Neal Ford coined the term Polyglot Programming, to express the idea that applications should be written in a mix of languages to take advantage of the fact that different languages are suitable for tackling different problems. Complex applications combine different types of problems, so picking the right language for the job may be more productive than trying to fit all aspects into a single language.

My programming career began in 1980, as a hobby growing up and an older brother mentoring me during his summer and holiday, etc. visits. Those are fond memories and I miss talking and being around him.  Just like I miss our Dad.

Aside from having a lengthy personal history of being at the keyboard or wielding a soldering iron and other various tools through elementary, into high school and through college to this day.

Being a polyglot with computer languages is rooted in my background designing and building actual hardware from the ground up. Yes, I am One of Those Guys. I Love to Tinker with Things. Love Life and The Adventures of Living.

.dec