Home Blog

Don’t blame us for people suffering

0


By Joe Tidy@joetidyCyber correspondent, BBC World Service
BBC Qilin's logo as it appears on their darknet websiteBBC

The hackers’ logo as it appears on their darknet website

The cyber-criminals responsible for causing major disruption at London hospitals say they are “sorry” for all the harm caused but are “not to blame”.

The ransomware gang spoke to the BBC on encrypted chat service qTox attempting to justify the attack as a form of political protest.

Qilin, which has a well established record of attempting to extort money, claims in this instance it carried out a cyber-attack as revenge for the UK government’s actions in an undisclosed war.

Experts are sceptical, however, with Jen Ellis, from the organisation Ransomware Task Force, telling the BBC that “cyber-criminals like this gang lie routinely.”

“Where they are from and why they have carried out the attack is secondary to the harm being caused right now to patients and hospital staff,” she added.

The hack has led to more than 1,000 operations and appointments being postponed and a critical incident being declared.

“Yes we know about the situation,” the hackers said, speaking in broken English.

“We are very sorry for the people who were suffered because of it. Herewith we don’t consider ourselves guilty and we ask you don’t blame us in this situation.”

The hackers said the UK government should be blamed as they were not helping in the unspecified war.

The gang, which is thought to be based in Russia, like many ransomware crews, would not say where it was.

It said the UK government “don’t even put a penny on the lives of those who fight on the front edge of free world”, which is reminiscent of language used to describe Ukraine’s fight against Russia’s invasion.

But it might also refer to Russian troops fighting against Ukraine.

The group says it chose to attack blood test firm Synnovis, which is used by two London NHS trusts, deliberately.

“Our citizens are dying in unequal combat from a lack of medicines and donor blood”, it said.

Researchers have previously said Qilin posted adverts for hackers to join its criminal service in Russian.

It would be unusual but not unprecedented for Qilin hackers to be in Ukraine, which has seen many alleged ransomware hackers arrested in recent months.

It is very rare for hackers to be arrested in Russia as the government there refuses to co-operate with Western law enforcement requests.

Qilin refused to be more specific about its political allegiance or geography “for security reasons”.

This is the first time that the crew has claimed to have a political motive for its hacks – Qilin has been tracked since 2022 in which time it has carried out criminal hacks against schools, hospitals, companies, councils and healthcare organisations.

Getty Guys and St Thomas HospitalGetty

Organs were diverted to other trusts for transplant and elective C-sections were rescheduled, the NHS said

The gang charges victims a ransom fee in Bitcoin to return systems to normal once they have infected a computer network or stolen private data.

On their darknet site, crew members regularly post details about their latest victims – of the dozens currently listed there are no others purportedly linked to political activism.

They have not yet posted any stolen data from Synnovis but added a post about the company to the darknet site on Wednesday. The hackers told the BBC they would soon be posting the stolen data. “Stay tunes”, they said.

The London hospitals hack was first announced on 3 June when pathology service provider Synnovis said all its IT systems were offline.

It meant that blood tests and information-sharing could not be carried out using the normal computerised systems.

The NHS trusts affected are Guy’s and St Thomas’ NHS Foundation Trust and King’s College Hospitals NHS Trust, with patients affected at four hospitals as well as GP services across Bexley, Greenwich, Lewisham, Bromley, Southwark and Lambeth boroughs.

One hospital doctor told BBC London that blood tests that once would have taken an hour could now take up to six hours, as the systems needed to process them are down.

qilin bbc chat

The hackers refused to answer any more questions once challenged by the BBC

According to NHS London, five planned C-sections were rescheduled and 18 organs were diverted for use by other trusts, while 736 hospital outpatient appointments and 125 community outpatient appointments had to be postponed.

Optional blood-borne virus (HIV, Hep C and Hep B) tests are also currently suspended.

Primary care appointments are going ahead as normal, but blood tests are being prioritised for urgent cases.

Synnovis says it is working to recover its IT systems and has not confirmed whether or not Qilin are holding it to ransom.

The BBC asked Qilin how they can justify harming innocent people they said “this interview is over” and have not responded since.





Source link

How to Disable and Remove Unwanted Services on Linux

0


When you install RHEL 9, the system comes with a minimal set of pre-installed packages and services to keep the system lightweight and secure.

However, over time, as you install new packages and services, your system can become bloated and vulnerable to security threats.

In this article, we will discuss how to disable and remove unwanted services and packages on RHEL-based distributions such as Rocky Linux, AlmaLinux, and Fedora, ensuring that your system remains secure and functional.

If you are planning to use your newly installed RHEL system to host, let’s say, a small website that runs on Apache or Nginx, or to provide network services like DNS, DHCP, PXE boot, FTP server, etc or other services that don’t require to run Postifx MTA, CUPS and Avahi daemons, then why we should keep all these unnecessary daemons installed or even running on your server.

The main external services that your server truly requires to run after you perform a minimal installation would be just a SSH daemon, in order to allow remote logins on the system, and, in some cases, NTP service, to accurately synchronize your server’s internal clock with external NTP servers.

Installing Useful System Utilities

After the installation finishes, login on your server with a root account or a user with root privileges and perform a system update, to make sure that your system is up-to-date with all packages and security patches.

yum update -y
yum upgrade y

The next step would be to install some useful system utilities such as net-tools (this package provides the older but good ifconfig command), nano text editor, wget for file download and curl for URL transfers, lsof (to list your open files), and bash-completion, which auto-completes typed commands.

yum install nano bash-completion net-tools wget curl lsof

Disable and Remove Unwanted Services in Linux

Now you can start disabling and removing pre-installed unwanted services, but before that, you need to get a list of all your enabled and running services on your system.

Checking Enabled Services

Before disabling services, it is essential to check which services are currently enabled on your system.

systemctl list-unit-files --type=service --state=enabled
List Enabled Services
List Enabled Services

Take note of the services that you want to disable.

Identifying Unnecessary Services

Before disabling and removing unwanted services, you need to identify which services are necessary and which ones can be safely disabled.

One way to do this is to examine the list of enabled services and look up their descriptions to determine what they do.

For example, the following command will show a list of all enabled services along with their descriptions:

systemctl list-unit-files --type=service --all --no-pager
Identifying Unnecessary Services
Identifying Unnecessary Services

You can then examine each service’s description to determine whether it is necessary for your system.

Another approach is to use a tool like systemd-analyze to analyze your system’s boot time and identify services that are slowing down the boot process.

systemd-analyze
systemd-analyze blame

The above command will display a list of all running systemd units (services) sorted by the time they took to initialize.

Analyze Boot Services
Analyze Boot Services

Services that are not critical to system operation and are slowing down the boot process can often be safely disabled.

Disable Unnecessary Services

Once you’ve identified a service that is not critical and might be slowing down boot time, you can disable and stop it using the following commands.

sudo systemctl disable <service_name>
sudo systemctl stop <service_name>

While the services that you need to disable or remove will depend on your specific use case, there are a few common services that you may want to consider disabling or removing on a minimal installation of RHEL.

Postfix

Postfix is a mail transfer agent (MTA) that is used to send and receive email on your system. If you are not using your system for email, you can disable and remove this service.

sudo systemctl stop postfix
sudo systemctl disable postfix
sudo yum remove postfix

Avahi

Avahi is a service that is used for zero-configuration networking, allowing devices to discover and communicate with each other on the same network.

If you do not require this functionality, you can disable and remove avahi service.

sudo systemctl stop avahi-daemon.socket
sudo systemctl disable avahi-daemon.socket
sudo yum remove avahi-autoipd avahi-libs avahi-tools

Cups

The cups service is used for printing. If your system does not require printing capabilities, you can disable and stop it:

sudo systemctl disable cups
sudo systemctl stop cups
suod yum remove cups

Removing Unwanted Services

In addition to removing unwanted services, you may also want to remove any packages that are no longer needed. Unused packages can take up disk space and potentially create security vulnerabilities.

First, list the installed packages to identify which ones are associated with unwanted services:

rpm -qa

To find out which package provides a particular service, use:

rpm -qf /usr/lib/systemd/system/<service_name>.service

To remove a package and its associated files, use.

sudo yum remove <package_name>

Best Practices for Disabling and Removing Services

When disabling and removing services, it is essential to follow best practices to ensure that your system remains secure and functional.

Here are some guidelines to follow:

  • Before removing a service, disable it to prevent it from running in the background, which can be done using the systemctl disable command.
  • Stop the service to prevent it from running in the current session, which can be done using the systemctl stop command.
  • Remove any packages that are no longer needed to free up disk space and reduce security vulnerabilities, which can be done using the yum remove command.
  • After disabling or removing services, refresh the systemd daemon to ensure that the changes take effect, which can be done using the systemctl daemon-reload command.
  • After removing services, check for ghost services that may still be running, which can be done using the systemctl list-units command.
Conclusion

Disabling and removing unwanted services and packages on RHEL is an essential step in maintaining system security and performance.

By following the steps outlined in this article, you can ensure that your system remains secure and functional. Remember to always follow best practices when disabling and removing services, and be cautious when removing packages to avoid potential security vulnerabilities.



Source link

‘Nowhere is safe’ for civilians as Sudan war descends further into chaos

0


The war that erupted last April between the Sudanese Armed Forces (SAF) and the paramilitary Rapid Support Forces (RSF) has triggered political instability, a severe humanitarian emergency and widespread human rights violations.

Over 15,500 fatalities have been reported in some 1,400 violent incidents targeting civilians and there are now almost 9.5 million forcibly displaced in Sudan – 7.3 million internally (IDPs) and 1.9 million in neighbouring countries.

Furthermore, around 18 million people are acutely food insecure and five million are facing starvation. Pregnant women are most at risk and 7,000 new mothers could die in the next few months if they do not get access to food and healthcare.

Fighting in El Fasher

The situation is particularly worrying in and around El Fasher, the provincial capital of North Darfur. The now-besieged city had a pre-war population of about 1.5 million, as well as sheltering a further 800,000 IDPs.

It is now under relentless bombardment and aerial attacks and atrocities against civilians are being committed along ethnic lines, Martha Pobee, UN Assistant Secretary-General at the Department of Political and Peacebuilding Affairs, told ambassadors at the Security Council.

Civilians are in the line of fire. Nowhere is safe for them,” she said.

She called for an immediate ceasefire and de-escalation in line with Security Council resolution 2736 adopted last week.

“A ceasefire in El Fasher is needed now to prevent further atrocities, protect critical infrastructure, and alleviate civilian suffering … the parties must heed this call without delay.”

A wide view of the UN Security Council meeting on the situation in Sudan.

A wide view of the UN Security Council meeting on the situation in Sudan.

Ethnic undertones

Ms. Pobee also noted escalation in fighting in other parts of Sudan, including Greater Khartoum, the Kordofan regions and Gezira state, where RSF members reportedly killed 100 civilians in an attack on a village on 5 June.

“Without swift action, Sudan risks becoming engulfed in more ethnic violence and fragment even further,” she warned.

“The risk of a conflict spillover remains high.”

Aid ‘woefully underfunded’

Ambassadors also heard an update from Edem Wosornu, the Director of Operations at the UN Office for the Coordination of Humanitarian Affairs (OCHA), who detailed the impact of the crisis on civilians and on relief efforts.

Though there have been some improvements over the last few weeks in access, such as approvals of visas and travel permits by authorities, aid operations continue to face serious challenges, including attacks against personnel.

“Six aid workers, all Sudanese nationals, have been killed over the last six weeks. This brings the total number of aid workers killed to 24 since the war started,” Ms. Wosornu said.

In addition, the $2.7 billion UN-led humanitarian appeal is “woefully underfunded”, she added, noting that so far only $441 million – 16 per cent – has been received.

We are in a race against time to avert massive loss of life in this unprecedented protection and food security crisis in Sudan. Every day that we wait for funding to come in, more lives are at risk,” she warned.

Members of the FFM, alongside Vice President of the Human Rights Council at the body's 56th session in Geneva.

UN Human Rights Council/Anna Marie Colombet

Rights investigators report

Meanwhile the Human Rights Council, in Geneva, which opened its 56th regular session on Tuesday heard from independent investigators probing alleged human rights violations and abuses against civilians, including refugees.

“We have received credible accounts of indiscriminate attacks against civilians and civilian objects, including through airstrikes and shelling in heavily populated residential areas, as well as ground attacks against civilians in their homes and villages,” said Mohamed Chande Othman, Chair of the Independent International Fact-Finding Mission (FFM) for the Sudan.

The FFM is also investigating other attacks against civilians across Sudan, including the mass killings in El Geneina and in Ardamata, of members of the Masalit community, between April and November of last year.

Ceasefire imperative

Mr. Othman underscored the human rights and humanitarian situation in Sudan cannot improve without an immediate ceasefire.

Despite repeated appeals by the international community, the fighting persists, he added, stressing that commanders must instruct their forces to abide by international humanitarian law, protect civilians and ensure punishment for violations.

At the same time, warring parties must not attack humanitarian workers, obstruct aid delivery and allow unfettered access to the millions of civilians in need in every part of Sudan.

The people of the Sudan are crying for help to restore their dignity and rights. They need the support of this [Human Rights] Council,” he concluded.

Independent investigators

The three-member independent Fact-Finding Mission was established by the Human Rights Council in October last year for an initial duration of one year.

Its mandate, among other points is to investigate and establish the facts, circumstances and root causes of all alleged human rights and humanitarian law-related violations.

Its Chair together with members Joy Ngozi Ezeilo and Mona Rishmawi, serve in their individual capacities, independent of the United Nations. None of the human rights experts serving are UN staff and they receive no salary.



Source link

UK probes HPE’s planned $14B Juniper Networks acquisition

0


The U.K.’s Competition and Markets Authority (CMA) has initiated a formal “phase 1” investigation into Hewlett Packard Enterprise’s (HPE) planned acquisition of Juniper Networks.

The CMA said it’s in the early stages of assessing whether the deal is likely to “result in a substantial lessening of competition within any market or markets in the United Kingdom for goods or services.”

HPE announced plans to acquire Juniper Networks back in January 2024, a deal designed to unify their respective strengths in the realms of networking and IT infrastructure, spanning servers, storage, consulting, routing, switching, and security. As with just about every mega deal these days, a major motivation behind the merger was — in corporate parlance — to “accelerate AI-driven innovation,” given the critical role that cloud infrastructure plays in the burgeoning AI movement.

At the time, HPE said it would pay $40 a share, representing a 32% premium over the most recent closing price — amounting to a total value of $14 billion.

A deal of this magnitude was always likely to attract regulatory scrutiny, and the U.K. is the first jurisdiction to show its hand, though it’s likely the European Commission will at least take a look at the deal, while the Federal Trade Commission (FTC) in the U.S. could potentially raise concerns, too. In the meantime, Brazil’s regulators gave an unconditional clearance to the deal in May.

Regulatory roadblocks can potentially scupper deals in the works. Adobe last year was forced to pull the plug on its $20 billion bid for Figma after pushback both in the EU and the U.K.

For now, the CMA is inviting comments from relevant stakeholders, with a deadline set for July 3. The CMA will then have until August 14 to decide whether to progress the investigation to a formal “phase 2” inquiry.

We have contacted HPE for comment and will update this post as we learn more.



Source link

How to Install Memcached for Faster Apps on RHEL 9

0


Memcached is an open-source distributed memory object caching program that allows us to improve and speed up the performance of dynamic web applications by caching data and objects in Memory.

Memcached is also used to cache entire database tables and queries to improve the performance of the database. It is the only caching system available freely and used by many big sites like YouTube, Facebook, Twitter, Reddit, Drupal, Zynga, etc.

Memcached can commit to denial of service attacks if not correctly configured. In this article, we will explain how to install and secure your Memcached server on RHEL-based Linux distributions such as Rocky Linux, AlmaLinux, and Fedora.

Installing Memcached in Linux

First, update your local software package index and then install Memcached from the official repositories using the following yum commands as root administrative user.

yum update
yum install memcached
Install Memcached in RHEL 9
Install Memcached in RHEL 9

Next, we will install libmemcached – a client library that offers a couple of tools to manage your Memcached server.

yum install libmemcached
Install libmemcached in RHEL
Install libmemcached in RHEL

Memcached should now be installed on your system as a service, along with the tools that require you to test its connectivity. Now we can proceed further to secure its configuration settings.

Securing Memcached Configuration Settings

To make assure that the installed Memcached service is listening on the 127.0.0.1 local interface, we will alter the OPTIONS variable in the /etc/sysconfig/memcached configuration file.

vi /etc/sysconfig/memcached

Search for the OPTIONS variable, and add the -l 127.0.0.1,::1 to OPTIONS variable. These configuration settings will protect our server from denial-of-service attacks.

/etc/sysconfig/memcached

PORT="11211"
USER="memcached"
MAXCONN="1024"
CACHESIZE="64"
OPTIONS="-l 127.0.0.1,::1"
Secure Memcached in RHEL
Secure Memcached in RHEL

Let’s discuss each of the above parameters in detail.

  • PORT : The port used by Memcached to run.
  • USER : The start-up daemon for the Memcached service.
  • MAXCONN : The value used to set max simultaneous connections to 1024. For busy web servers, you can increase to any number based on your requirements.
  • CACHESIZE : Set cache size memory to 2048. For busy servers, you can increase up to 4GB.
  • OPTIONS : Set the IP address of the server, so that Apache or Nginx web servers can connect to it.

Restart and enable your Memcached service to apply your configuration changes.

systemctl restart memcached
systemctl enable memcached

Once started, you can confirm that your Memcached service is bound to the local interface and listening only on TCP connections using following netstat command.

netstat -plunt
Check Memcached Server
Check Memcached Server

You can also check the status of the server using the memcached-tool as shown.

memcached-tool 127.0.0.1 stats
Check Memcached Running Status
Check Memcached Running Status

Now make sure to allow access to the Memcached server by opening a port 11211 on your firewall as shown.

firewall-cmd --permanent --zone=public --add-port=11211/tcp

Test Memcached Installation

To verify that Memcached is working properly, you can connect to it using the telnet command.

telnet localhost 11211

If the connection is successful, you’ll see a prompt similar to this:

Test Memcached Server
Test Memcached Server

Install Memcached PHP Extension

To install the Memcached PHP extension and integrate it with Perl, Python, Apache, and Nginx on a Linux system, you’ll need to follow specific steps for each component.

For PHP:

yum install php-memcached

You may need to restart Apache, Nginx, or PHP-FPM after installation:

systemctl restart httpd   
systemctl restart nginx
systemctl restart php-fpm 

For Perl:

yum install perl-Cache-Memcached

For Python:

yum install python3-memcached

Once installed, configure your PHP, Perl, or Python applications to utilize Memcached for caching. This involves modifying application code to connect to the Memcached server and store/retrieve cached data.

Conclusion

In this article, we have explained how to install and secure your Memcached server for the local network interface, aiming to optimize the performance of dynamic web applications by reducing database load through efficient caching.

If you have faced any issues during installation, do ask for help in our comment section below.



Source link

Parent, technician, farmer, merchant: What more can a teacher be?

0


On World Refugee Day, marked annually on 20 June, meet some of the multi-talented teachers and principals of migrant learning centres in Thailand along the border with Myanmar, who, with UN support, are doing all they can to keep up with the influx of children seeking sanctuary.

Overcoming challenges beyond the classroom is a daily reality for educators in 63 learning centres in Tak province who currently serve around 14,400 students, up from 11,450 in 2020, according to the Thai Ministry of Education’s office that supports basic education in five border districts – Mae Sot, Phop Phra, Mae Ramat, Tha Song Yang and Umphang.

Yet, teachers and principals are finding solutions by taking on roles of parents, farmers, merchants and, sometimes, as one-person non-governmental organizations (NGOs), using limited resources to serve a constant influx of children and meet myriad needs, from housing to homework.

Two girls return to class at a migrant learning centre.

Two girls return to class at a migrant learning centre.

The day starts at sunrise

The principal at a migrant learning centre in Phop Phra district, around 450km northwest of Bangkok, cares for around 110 children in kindergarten to sixth grade, including 20 students living in its dormitories.

Her day starts at sunrise and ends well after sunset. She teaches, manages the centre’s finances, collects firewood, prepares food and cooks. She also cares for and comforts scores of children in lieu of their parents, who are working elsewhere in Thailand or in their home country.

Her hard work is unpaid. Of the centre’s six teaching staff, all in their 30s, only three receive a small monthly stipend of 3,000 Thai baht (USD$80), a sum less than half of the average labourer’s salary of around $200.

Taking on extra jobs

The situation is the same across Tak province. Like many other teachers at learning centres in the area, the unpaid 48-year-old principal of one in Phop Phra district has been earning extra income for her centre.

She makes mote si kyaw, a popular Myanmar fried pastry made from rice flour, to sell for a modest profit and also keeps a few goats to sell when the centre is in special need of extra cash.

“I’m doing everything I can,” she said. “This centre is my life.”

The homemade water filtration system maintained by teachers for clean water use.

The homemade water filtration system maintained by teachers for clean water use.

Ensuring food security and more

Over in Mae Ramat district, located less than a kilometre from the Myanmar border, a remote migrant learning centre is accessible only via a bumpy path eight kilometres from the main road. It relies on five units of solar panels for limited use for dormitory lighting and pumping groundwater, according to its 29-year-old principal.

He said his staff of five other teachers work hard to serve the needs of its 50 residents, growing their own rice and maintaining pipe and filtration systems for a clean water supply.

“Although the children are safe here, they are worried about their parents on the Myanmar side,” he said.

A teacher gives a mathematics class.

A teacher gives a mathematics class.

‘We can still hear gunshots’

Before the conflicts in Myanmar, many children followed their parents, who were looking for jobs in Thailand. However, with ongoing conflicts on the immediate horizon, returning “home” is hardly an option.

For them, remaining in school means being protected, said the 38-year-old deputy principal of a centre for about 200 children in Mae Sot district, around 10km from Myanmar’s border.

“We can still hear gunshots when there is fighting, but children feel safe here,” he said. “We are trying our best to make sure that we can keep the centre open for the children.”

Clothes dry in the playground of a migrant learning centre.

Clothes dry in the playground of a migrant learning centre.

Supporting education and more

However, many educators voiced concerns, worrying about meeting expenses to run their centres and whether they can accommodate the expected influx of more newscomers and ensure the children’s well-deserved safety.

To support efforts under way, Pilat Udomwong, the director of the dedicated Thai Ministry of Education’s office for Tak province, said its mission is to monitor operating conditions, register migrant teachers and students and support the centres through partnerships.

Some projects have already seen results, including one supported by the Japanese Government and the UN Educational, Scientific and Cultural Organization (UNESCO) regional office in Bangkok that, since last August, includes upgrading facilities, installing IT equipment for flexible learning programmes and delivering food items to support the 20 centres with basic lodging.

This has meant more than 7,000 migrant learners now have three nutritious meals daily.

Children return home after classes at a migrant learning centre.

Children return home after classes at a migrant learning centre.

Growing up to have a better life

During a recent site visit, UNESCO Bangkok’s education programme specialist Rika Yorozu underscored that the right to education is part of the agency’s mandate.

“We want to ensure that children are given continued support to continue their learning regardless of nationality,” she said. “Teachers [in the migrant learning centres] are doing tremendous work. They are dedicated and need this support.”

While assistance is being rolled out, the hard-working teachers are still assuming multiple roles in keeping their centres running. The principal at a centre in Phop Phra summed up a common feeling that echoes across many districts.

“I will continue to do these things for the children,” she said. “My happiness is to see the children smiling, being safe, well-fed and growing up to have a better life.”



Source link

'I Felt Shameful and Fearful': Teen Who Saw AI Fake Nudes of Herself Speaks Out

0



The Texas teenager joined Sens. Ted Cruz, Amy Klobuchar and other lawmakers in pushing for a bill to criminalize “deepfake” nonconsensual images.



Source link

How to Install TeamViewer on Ubuntu 24.04

0


TeamViewer is a cross-platform, proprietary application that allows a user to remotely gain access to another user’s desktop, share the desktop, and even allow file transfer between computers over an internet connection.

TeamViewer is a popular application among helpdesk support staff and comes in handy when helping out remote users who are stuck and cannot find worthwhile assistance.

This article will guide you through the process of installing TeamViewer on Ubuntu 24.04, Ubuntu 22.04, and Ubuntu 20.04.

Installing TeamViewer in Ubuntu

Before getting started, it’s recommended to update your system packages, which will ensure that you start on a clean slate. So open your terminal and issue the command below.

sudo apt update -y
sudo apt upgrade -y

Once you are through with updating your system, head over to the official Teamviewer’s download page and download Teamviewer’s Ubuntu/Debian package.

Alternatively, you can copy the download link and download the Debian package using the following wget command as shown.

-------- For x86-64bit -------- 
sudo wget https://download.teamviewer.com/download/linux/teamviewer_amd64.deb

-------- For x86-32bit --------
sudo wget https://download.teamviewer.com/download/linux/teamviewer_i386.deb

Upon successfully downloading the file, you can verify its existence using the ls command as shown.

ls | grep teamviewer

teamviewer_amd64.deb

To install TeamViewer, run the command shown, which will install TeamViewer alongside other dependencies.

sudo apt install ./teamviewer_amd64.deb
Install TeamViewer on Ubuntu
Install TeamViewer on Ubuntu

When prompted to continue with the installation, type ‘Y’ for Yes and hit the ‘ENTER’ button.

Launch TeamViewer in Ubuntu

Once the installation is complete, you can proceed to Launch Teamviewer. To launch Teamviewer, run the command below on the terminal.

teamviewer

Also, you can use the application manager to search and launch the TeamViewer application as shown.

Launch TeamViewer from Application Manager
Launch TeamViewer from the Application Manager

When you first run TeamViewer, you will be prompted to accept the license agreement. Click “Accept License Agreement” to proceed.

TeamViewer License Agreement
TeamViewer License Agreement

TeamViewer will then display your unique ID and temporary password. Share these details with the person you want to connect with or use them to connect to another device.

Running TeamViewer on Ubuntu
Running TeamViewer on Ubuntu

Using TeamViewer in Ubuntu

To make a remote connection to another user, simply provide them with your Teamviewer ID and password. The user will insert the ID at the ‘Insert partner ID’ text field after which they will click on the ‘Connect’ button.

Later, they will be prompted for the password which will then give them a remote connection to your desktop.

Uninstalling TeamViewer in Ubuntu

If you ever need to uninstall TeamViewer, you can do so using the following command.

sudo apt-get remove teamviewer

This will remove TeamViewer from your system along with its configuration files.

Conclusion

Installing TeamViewer on Ubuntu is a straightforward process whether you prefer using the graphical interface or the command line.

Once installed, TeamViewer provides a powerful tool for remote desktop access and support, enhancing collaboration and productivity across different locations.



Source link

Systemic gender oppression in Afghanistan may amount to crimes against humanity

0



The de facto authorities in Afghanistan, the Taliban, swept back into power in August 2021 and swiftly began curtailing women’s rights, including imposing stricter dress codes, banning higher education for girls, excluding women from the job market, and restricting freedom of movement in public spaces. 

This repression is bolstered by the Taliban’s use of violence, mainly through murder, enforced disappearance, torture, rape and other inhumane acts, according to the UN expert’s latest report. 

“The Taliban’s institutionalisation of its system of oppression of women and girls, and the harms that it is continuing to entrench, should shock the conscience of humanity,” said Mr. Bennett. 

Systemic ‘gender apartheid’ 

Since the Taliban takeover, a series of verbal and written decrees have effectively eliminated the fundamental freedoms of Afghan women and girls, with violence being used to enforce their edicts.  

According to the report, the systematised oppression will disempower Afghan women across generations, ingraining their inferior socioeconomic status and State-enforced dependence on men. 

Mr. Bennett is firmly of the viewpoint that “gender apartheid” most fully encapsulates this ongoing injustice, given its institutionalised and ideological nature.

The Human Rights Council-appointed expert is recommending Member States recognise the concept of gender apartheid and propel its codification. He believes doing so will effectively address the unmatched human rights crisis confronting Afghan women. 

‘All tools’ approach needed

The UN expert is calling on the Taliban to take immediate steps to restore the fundamental rights of women and girls. He is also pushing for an “all tools” approach to dismantle the Taliban’s institutionalised system of gender oppression and to hold those responsible to account. 

This would involve international accountability mechanisms including the International Criminal Court (ICC) and the International Court of Justice (ICJ). It would also include pursuing cases at the national level. 

Mr. Bennett opposes any legitimization of the Taliban leadership until concrete, measurable, and verified improvements on human rights take place. 

“Afghans, in particular Afghan women and girls, have shown tremendous bravery and determination in the face of Taliban oppression. The international community must match this with protection and solidarity, including decisive and principled action, which places human rights front and centre,” the UN expert said.



Source link

How to Install LZ4 on Linux for Super-Fast File Compression

0


LZ4 is an extremely fast lossless compression algorithm that aims to provide very high speeds of compression and decompression (compression speeds of over 500 MB/s per CPU core) with reasonable compression ratios.

This makes it an excellent choice for applications that require high-speed compression, such as data transmission, real-time processing, network transmission, kernel decompression, and storage optimization.

Unlike some other compression algorithms, LZ4 also features a very fast decompression speed, often reaching the limits of RAM speed on multi-core systems.

This article will guide you through installing and using LZ4 on a Linux system with practical examples.

Installing LZ4 on Linux

The easiest way to install LZ4 is to use pre-built packages available in your Linux distribution’s repositories.

sudo apt install lz4         [On Debian, Ubuntu and Mint]
sudo yum install lz4         [On RHEL/CentOS/Fedora and Rocky/AlmaLinux]
sudo emerge -a sys-apps/lz4  [On Gentoo Linux]
sudo apk add lz4             [On Alpine Linux]
sudo pacman -S lz4           [On Arch Linux]
sudo zypper install lz4      [On OpenSUSE]    
sudo pkg install lz4         [On FreeBSD]

If you prefer to build LZ4 from the source, your distribution does not provide a precompiled package, or you need the latest version of LZ4, you can clone the repository and build the library and tools using the following commands.

git clone https://github.com/lz4/lz4.git
cd lz4
make
sudo make install

Using LZ4 to Compress and Decompress Files

LZ4 provides a command-line tool that can be used to compress and decompress files, as shown in the following practical examples.

To compress a file using LZ4, use the following command.

lz4 tecmint.txt tecmint_file.lz4

To decompress a file compressed with LZ4, use:

lz4 -d tecmint_file.lz4 decompressed_tecmint.txt
LZ4 File Compression and Decompression
LZ4 File Compression and Decompression

Using LZ4 to Compress and Decompress Directories

LZ4 does not directly support compressing directories, but you can use the tar command in conjunction with LZ4 to achieve this.

To compress a directory using LZ4, use the following command.

tar cf - tecmint | lz4 - compressed_tecmint.tar.lz4

To decompress a directory using LZ4, use the following command.

lz4 -d compressed_tecmint.tar.lz4 | tar -xvf -
LZ4 Directory Compression and Decompression
LZ4 Directory Compression and Decompression

Using LZ4 with Pipes

LZ4 can be used in a pipeline to compress or decompress data as it is being processed by other commands.

If you have a large log file and want to compress it while streaming.

cat large_log_file.log | lz4 - compressed_log.lz4

You can decompress a file and process its content on the fly.

lz4 -d compressed_log.lz4 | grep "ERROR"

Setting LZ4 Compression Levels

LZ4 offers several compression levels, ranging from 1 (fast) to 9 (high compression). You can specify the compression level using the -1 to -9 flags.

For example, to use the highest compression level:

lz4 -9 input_file.txt compressed_file.lz4

This command uses compression level 9 for a better compression ratio at the expense of speed.

To get more information about the compression process, use the -v flag.

lz4 -v input_file.txt compressed_file.lz4

For maximum compression, use the -HC option.

lz4 -HC input_file.txt compressed_file.lz4

This mode is significantly slower but provides better compression ratios.

Using LZ4 Library in Applications

If you are a developer, you can use the LZ4 library to integrate compression capabilities into your applications.

Here is a basic example using the LZ4 C API:

#include <lz4.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>

int main() {
    const char* input = "This is a test string to compress using LZ4.";
    int inputSize = strlen(input) + 1;
    int maxCompressedSize = LZ4_compressBound(inputSize);
    char* compressed = malloc(maxCompressedSize);

    int compressedSize = LZ4_compress_default(input, compressed, inputSize, maxCompressedSize);

    if (compressedSize > 0) {
        printf("Compression successful: %d bytes compressed to %d bytes\n", inputSize, compressedSize);
    } else {
        printf("Compression failed\n");
    }

    free(compressed);
    return 0;
}

This simple program compresses a string using LZ4 and prints the compressed size.

Conclusion

LZ4 is an extremely fast compression algorithm suitable for scenarios where speed is crucial. Installing LZ4 on Linux is straightforward by using package managers or by building from source.

This article covered basic and advanced usage of LZ4 with practical examples. Additionally, we provided a brief example of integrating LZ4 into a C application.

With this knowledge, you can leverage LZ4 for efficient data compression in various applications and workflows on your Linux system.



Source link

netbalaban news