ePanorama.net

All about electronics and circuit design

How To Use Bash Parameter Substitution

https://www.cyberciti.biz/tips/bash-shell-parameter-substitution-2.html The $ character is used for parameter expansion, arithmetic expansion and command substitution. You can use it for manipulating and expanding variables on demands without using external commands such as perl, python, sed or awk. This guide shows you how to use parameter expansion modifiers.

ICS Companies Are Worried About Cybersecurity, But Are They Worried About Right Things?

http://securityaffairs.co/wordpress/60013/hacking/ics-cybersecurity.html The equipment was expected to be installed and left alone for a long time. Pressures to reduce operating costs led to this equipment being connected, and the easiest networking equipment to find was designed for convenience in a corporate environment — not security in an ICS environment.  This has led to the current situation where malware

The top 7 Linux IoT projects | Network World

http://www.networkworld.com/article/3200272/internet-of-things/the-top-7-linux-iot-projects.html It’s a Linux world, and the rest of computing is just living in it. IoT is no exception. The Linux Foundation lists these seven projects as the key players in the march of connected open-source systems. This article is a quick rundown on them.

Apple co-founder Wozniak: Motivation is more important than knowledge

http://www.cnbc.com/2017/06/12/apple-co-founder-wozniak-motivation-is-more-important-than-knowledge.html The most important ingredient to becoming successful is having motivation, says Apple co-founder Steve Wozniak. “If somebody is motivated and wants to do something, wanting — it’s emotional. That’s the person that is probably going to go out and find a way to actually get it done.” The Internet has made it possible for anyone with the

IMS 2017: RF/microwave test equipment, part 1 | EDN

http://www.edn.com/electronics-blogs/rowe-s-and-columns/4458491/IMS-2017–RF-microwave-test-equipment–part-1?utm_content=buffer9eaa6&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer The IEEE International Microwave Symposium is in Honolulu, Hawaii in 2017. Here is some of the new test equipment seen by EDN staff.

Now You Can Run Linux On Windows 10 Without Enabling Developer Mode

https://fossbytes.com/linux-on-windows-10-without-developer-mode/ With the release of Windows 10 Insider Build 16215, Microsoft has announced that now users don’t need to activate Developer Mode to run Linux on Windows 10. Now, Microsoft thinks that WSL is stable enough to remove this restriction. However, this change still keeps Linux an optional component and the users manually need to

If Humble People Make the Best Leaders, Why Do We Fall for Charismatic Narcissists?

https://hbr.org/2017/04/if-humble-people-make-the-best-leaders-why-do-we-fall-for-charismatic-narcissists The research is clear: when we choose humble, unassuming people as our leaders, the world around us becomes a better place. Humble leaders improve the performance of a company in the long run because they create more collaborative environments.  When leaders behave humbly, followers emulate their modest attitude and behavior.  A clinical study illustrates that when charisma overlaps

A 10-step guide to creating an email client with Webix framework

https://opensource.com/article/17/5/10-step-guide-webix-framework?sc_cid=7016000000127ECAAY Free Webix framework is a JavaScript and HTML5 framework for developing cross-platform, data-rich web applications with responsive user interfaces. The library is fast, lightweight, and easy to learn. Integration with AngularJS, Vue.js, and jQuery may be pretty handy. Based on this article Webix looks interesting.

Tracking Hacking: The World’s Biggest Data Breaches

http://www.visualcapitalist.com/worlds-biggest-data-breaches/?utm_source=facebook&utm_medium=social&utm_campaign=SocialWarfare Before 2009, the majority of data breaches were the fault of human errors like misplaced hard drives and stolen laptops, or the efforts of “inside men” looking to make a profit by selling data to the highest bidder. Since then, the volume of malicious hacking has exploded relative to other forms of data loss.

How to prevent unprivileged users from viewing dmesg command output on Linux – nixCraft

https://www.cyberciti.biz/faq/how-to-prevent-unprivileged-users-from-viewing-dmesg-command-output-on-linux/ One can use dmesg command see or control the kernel ring buffer.  The kernel syslog contains debugging information that is often useful during exploitation of other vulnerabilities, such as kernel heap addresses.  There is an option that prevents unprivileged users from reading the syslog. sudo sysctl -w kernel.dmesg_restrict=1