A “hierarchical spreadsheet” that is a great replacement for spreadsheets, mind mappers, outliners, PIMs, text editors and small databases[…]
Suitable for any kind of data organization, such as todo lists, calendars, project management, brainstorming, organizing ideas, planning, requirements gathering, presentation of information, etc.
Forensic Architecture (FA) is a research agency, based at Goldsmiths, University of London, investigating human rights violations including violence committed by states, police forces, militaries, and corporations. FA works in partnership with institutions across civil society, from grassroots activists, to legal teams, to international NGOs and media organisations, to carry out investigations with and on behalf of communities and individuals affected by conflict, police brutality, border regimes and environmental violence.
Our investigations employ cutting-edge techniques in spatial and architectural analysis, open source investigation, digital modelling, and immersive technologies, as well as documentary research, situated interviews, and academic collaboration. Findings from our investigations have been presented in national and international courtrooms, parliamentary inquiries, and exhibitions at some of the world’s leading cultural institutions and in international media, as well as in citizen’s tribunals and community assemblies[…]
Mobile Verification Toolkit (MVT) is a tool to facilitate the consensual forensic analysis of Android and iOS devices, for the purpose of identifying traces of compromise.
In this documentation you will find instructions on how to install and run the mvt-ios and mvt-android commands, and guidance on how to interpret the extracted results[…]
Deceptive design patterns (also known as “dark patterns”) are tricks used in websites and apps that make you do things that you didn't mean to, like buying or signing up for something. The purpose of this site is to spread awareness and to shame companies that use these patterns[…]
This tool will help you to create a Firefox profile with the defaults you like.
You select which features you want to enable and disable and in the end you get a download link for a zip-file with your profile template. You can for example disable some functions, which send data to Mozilla and Google, or disable several annoying Firefox functions like Mozilla Hello or the Pocket integration.
Each Setting has a short explanation and for the non obvious settings links to resources describing the feature and the possible problems with it[…]
Often this is easier with the compose key. With that configured you use key combos to get the special characters. For instance:
For ë you press Compose+", e.
For ẽ you press Compose+~, e.
For ô you press Compose+^, o.
For á you press Compose+', a.
For € you press Compose+=, e.
For £ you press Compose+-, l.
Note that you do not have to hold down the compose key; just press each key in order.
To set the compose key go to System –> Preferences –> Keyboard, then Layouts –> Options. Open up Compose Key Position and choose a key. I use Right-Alt.
Linux offers a vast collection of open source small utilities that perform functions ranging from the obvious to the bizarre. It’s the quality and selection of these tools that help Linux stand out as a productive environment. A good utility cooperates with other applications, integrating seamlessly[…]
Please enter all the system components that you use or plan to use in your system in the fields below.
To calculate the correct wattage of the power supply we use the peak power consumption of each component in your configuration according to the manufacturer's information.
You can save your configuration and load it anytime if needed[…]