nemozone

a zone for no one and everyone :) Btw this blog is only for adults! Dieser Blog ist nur für Erwachsene!

An interactive cheatsheet tool for the command-line.

https://github.com/denisidoro/navi

On Ubuntu based systems this can be easily installed via homebrew linux brew from brew.sh

https://www.how2shout.com/linux/how-to-install-brew-ubuntu-20-04-lts-linux/

Piriform's Speccy software provides detailed information about the hardware equipment of the computer and the Windows system and displays, among other things, the current temperatures of various system components. Speccy is also available as an enhanced Professional version with premium support. Among other things, the software also shows which hard disk is installed in the PC used.

https://www.ccleaner.com/de-de/speccy/download/standard

Well, it appears that on systems where the hosts conf has been borked. Or that Firefox on rare occasions has a bug which has redirection issues, whatever...

Here are some links which refer to this very odd behavior

https://support.mozilla.org/bm/questions/1011327

https://support.mozilla.org/de/questions/1326837

https://bugzilla.mozilla.org/show_bug.cgi?id=1453207

Well one could apply the mentioned solutions or edit the hosts conf file

sudo cp /etc/hosts /etc/hosts.bak
sudo vim /etc/hosts 

#Remove all entries or comment them out, whatever
#On a test system, have these fresh entries
127.0.0.1        localhost
127.0.1.1        test

# The following lines are desirable for IPv6 capable hosts
::1     ip6-localhost ip6-loopback
fe00::0 ip6-localnet
ff00::0 ip6-mcastprefix
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters 

Don't forget to save your changes and done

Lool an AppImage hub via flathub, this f…ing hilarious xD

https://flathub.org/apps/details/io.github.prateekmedia.appimagepool

In software engineering, multitier architecture (often referred to as n-tier architecture) is a client–server architecture in which presentation, application processing and data management functions are physically separated. The most widespread use of multitier architecture is the three-tier architecture.

N-tier application architecture provides a model by which developers can create flexible and reusable applications. By segregating an application into tiers, developers acquire the option of modifying or adding a specific tier, instead of reworking the entire application. A three-tier architecture is typically composed of a presentation tier, a logic tier, and a data tier.

While the concepts of layer and tier are often used interchangeably, one fairly common point of view is that there is indeed a difference. This view holds that a layer is a logical structuring mechanism for the conceptual elements that make up the software solution, while a tier is a physical structuring mechanism for the hardware elements that make up the system infrastructure. For example, a three-layer solution could easily be deployed on a single tier, such in the case of an extreme database-centric architecture called RDBMS-only architecture or in a personal workstation[…]

A very, very important concept which one should definetively try to understand.

https://wikiless.sethforprivacy.com/wiki/Multitier_architecture?lang=en https://en.wikipedia.org/wiki/Multitier_architecture

A “hierarchical spreadsheet” that is a great replacement for spreadsheets, mind mappers, outliners, PIMs, text editors and small databases[…]

Suitable for any kind of data organization, such as todo lists, calendars, project management, brainstorming, organizing ideas, planning, requirements gathering, presentation of information, etc.

https://strlen.com/treesheets/

There is also an appimage for this

Forensic Architecture (FA) is a research agency, based at Goldsmiths, University of London, investigating human rights violations including violence committed by states, police forces, militaries, and corporations. FA works in partnership with institutions across civil society, from grassroots activists, to legal teams, to international NGOs and media organisations, to carry out investigations with and on behalf of communities and individuals affected by conflict, police brutality, border regimes and environmental violence.

Our investigations employ cutting-edge techniques in spatial and architectural analysis, open source investigation, digital modelling, and immersive technologies, as well as documentary research, situated interviews, and academic collaboration. Findings from our investigations have been presented in national and international courtrooms, parliamentary inquiries, and exhibitions at some of the world’s leading cultural institutions and in international media, as well as in citizen’s tribunals and community assemblies[…]

https://forensic-architecture.org/about/agency

https://forensic-architecture.org/

Mobile Verification Toolkit (MVT) is a tool to facilitate the consensual forensic analysis of Android and iOS devices, for the purpose of identifying traces of compromise.

In this documentation you will find instructions on how to install and run the mvt-ios and mvt-android commands, and guidance on how to interpret the extracted results[…]

https://docs.mvt.re/en/latest/

How does technology use design to influence my behavior?[…]

https://www.humanetech.com/youth/persuasive-technology

What is deceptive design?

Deceptive design patterns (also known as “dark patterns”) are tricks used in websites and apps that make you do things that you didn't mean to, like buying or signing up for something. The purpose of this site is to spread awareness and to shame companies that use these patterns[…]

https://www.deceptive.design/