OpenRefine
A free, open source, powerful tool for working with messy data
Website: https://openrefine.org/download.html Source: https://github.com/OpenRefine/OpenRefine
a zone for no one and everyone :) Btw this blog is only for adults! Dieser Blog ist nur für Erwachsene!
A free, open source, powerful tool for working with messy data
Website: https://openrefine.org/download.html Source: https://github.com/OpenRefine/OpenRefine
Critical thinking is a key skill in media and information literacy, and the mission of libraries is to educate and advocate its importance.
Discussions about fake news has led to a new focus on media literacy more broadly, and the role of libraries and other education institutions in providing this.
When Oxford Dictionaries announced post-truth was Word of the Year 2016, we as librarians realise action is needed to educate and advocate for critical thinking – a crucial skill when navigating the information society.
IFLA has made this infographic with eight simple steps (based on FactCheck.org’s 2016 article How to Spot Fake News) to discover the verifiability of a given news-piece in front of you. Download, print, translate, and share – at home, at your library, in your local community, and on social media networks. The more we crowdsource our wisdom, the wiser the world becomes.
https://www.ifla.org/publications/node/11174
Here, also a good reference, but this is in german, I'm sorry
Here are some additional sources
https://www.hoax-slayer.net/ https://www.snopes.com/ https://www.klartext-nahrungsergaenzung.de/ https://kit.exposingtheinvisible.org/en/ https://www.politifact.com/ https://www.newsguardtech.com/ https://datadetoxkit.org/en/misinformation/steerclear/ https://toolsforreporters.com/2020/11/11/the-media-manipulation-casebook/ https://expertisefinder.com/ Find some experts and ask them direct https://misinfocon.com/ https://datajournalism.com/read/handbook/verification-3 https://www.allsides.com/media-bias/media-bias-chart https://mediabiasfactcheck.com/ https://adfontesmedia.com/ https://www.lobbyregister.bundestag.de/startseite https://www.lobbycontrol.de/ https://www.abgeordnetenwatch.de/ https://fragdenstaat.de/ https://www.countrycode.org/ https://der-newstest.de/ https://correctiv.org/en/ https://uebermedien.de/ https://dpa-factchecking.com/
https://addons.mozilla.org/en-US/firefox/addon/newsguard/ https://chrome.google.com/webstore/detail/official-media-bias-fact/hdcpibgmmcnpjmmenengjgkkfohahegk?hl=en-US
How Can Tabula Help Me? If you’ve ever tried to do anything with data provided to you in PDFs, you know how painful it is — there's no easy way to copy-and-paste rows of data out of PDF files. Tabula allows you to extract that data into a CSV or Microsoft Excel spreadsheet using a simple, easy-to-use interface. Tabula works on Mac, Windows and Linux. Who Uses Tabula? Tabula is used to power investigative reporting at news organizations of all sizes, including ProPublica, The Times of London, Foreign Policy, La Nación (Argentina), The New York Times and the St. Paul (MN) Pioneer Press. Grassroots organizations like SchoolCuts.org rely on Tabula to turn clunky documents into human-friendly public resources. And researchers of all kinds use Tabula to turn PDF reports into Excel spreadsheets, CSVs, and JSON files for use in analysis and database applications…
https://github.com/tabulapdf/tabula-java/
https://cran.r-project.org/web/packages/tabulizer/vignettes/tabulizer.html
Share and accept documents securely.
SecureDrop is an open source whistleblower submission system that media organizations and NGOs can install to securely accept documents from anonymous sources. It was originally created by the late Aaron Swartz and is now managed by Freedom of the Press Foundation. SecureDrop is available in 20 languages
Thanks to GlobaLeaks everybody can easily setup a secure and anonymous whistleblowing initiative[…]
Everything you wanted to know about media metadata, but were afraid to ask
Metadata comes in handy sometimes, like when you’re flipping through old pictures by date, or by location. But in the wrong hands, this same information could be damaging.
https://freedom.press/training/everything-you-wanted-know-about-media-metadata-were-afraid-ask/
Check out our MacOS/Windows Software on our official webpage. Fawkes is a privacy protection system developed by researchers at SANDLab, University of Chicago. For more information about the project, please refer to our project webpage. Contact us at fawkes-team@googlegroups.com. We published an academic paper to summarize our work “Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models” at USENIX Security 2020.
https://en.wikipedia.org/wiki/Tesseract_(software)
https://github.com/tesseract-ocr/tesseract
About This package contains an OCR engine – libtesseract and a command line program – tesseract. Tesseract 4 adds a new neural net (LSTM) based OCR engine which is focused on line recognition, but also still supports the legacy Tesseract OCR engine of Tesseract 3 which works by recognizing character patterns. Compatibility with Tesseract 3 is enabled by using the Legacy OCR Engine mode (—oem 0). It also needs traineddata files which support the legacy engine, for example those from the tessdata repository. The lead developer is Ray Smith. The maintainer is Zdenko Podobny. For a list of contributors see AUTHORS and GitHub's log of contributors.
Anleitung: Tesseract OCR auf Ubuntu 22.04 installieren Tesseract OCR ist eine Open-Source-Software zur optischen Zeichenerkennung (Optical Character Recognition, OCR), die auf Ubuntu 22.04 installiert werden kann. Mit Tesseract OCR können Sie Bilder und PDF-Dateien in Text umwandeln, auch für die deutsche Sprache.
Tesseract OCR installieren
Öffnen Sie die Befehlszeile und geben Sie folgenden Befehl ein:
sudo apt-get install tesseract-ocr tesseract-ocr-dev libleptonica-dev libtesseract-dev
German language-Pack herunterladen
Um die deutsche Sprache zu unterstützen, müssen Sie das German language-Pack herunterladen. Geben Sie dazu den Befehl
sudo apt-get install tesseract-ocr-script-deu
ein.
Tessdata Ordner erstellen
Erstellen Sie einen Ordner namens “tessdata” in Ihrem Home-Verzeichnis. Geben Sie dazu den Befehl
mkdir ~/tessdata
ein.
German language-Pack in den Tessdata Ordner kopieren
Kopieren Sie das heruntergeladene German language-Pack in den Tessdata-Ordner. Geben Sie dazu den Befehl
cp /usr/share/tesseract-ocr/tessdata/script/deu.traineddata ~/tessdata
ein.
Tesseract OCR ausführen
Sie können jetzt Tesseract OCR auf ein Bild oder eine PDF-Datei anwenden. Geben Sie dazu den Befehl
tesseract image.png image.txt -l deu
ein, wobei “image.png” durch den Namen Ihres Bildes oder PDF-Datei ersetzt werden sollte.
Beachten Sie, dass Tesseract OCR möglicherweise nicht perfekt ist und Fehler bei der Erkennung von Texten machen kann, insbesondere bei schlechter Bildqualität oder ungewöhnlichen Schriftarten. Es gibt jedoch viele Tools und Methoden, um die Genauigkeit von Tesseract OCR zu verbessern.
Schritte um die Genauigkeit von Tesseract OCR zu erhöhen
Es gibt mehrere Möglichkeiten, um die Genauigkeit von Tesseract OCR zu verbessern:
Bildvorbereitung: Stellen Sie sicher, dass das Bild, das Sie verwenden möchten, ausreichend hell und kontrastreich ist. Eine Skalierung oder Beschnitt des Bildes kann auch helfen, um die OCR-Genauigkeit zu verbessern.
Schriftart- und Schriftgrößen-Trainingsdaten: Tesseract OCR kann trainiert werden, um bestimmte Schriftarten und Schriftgrößen besser zu erkennen. Durch Hinzufügen von Trainingsdaten für diese Schriftarten und Schriftgrößen kann die Genauigkeit verbessert werden.
Benutzerdefinierte Wörterbücher: Tesseract OCR kann auch mit einem benutzerdefinierten Wörterbuch trainiert werden, um bestimmte Wörter oder Abkürzungen besser zu erkennen.
Konfigurationsoptionen: Tesseract OCR hat verschiedene Konfigurationsoptionen, die verwendet werden können, um die Genauigkeit zu verbessern. Dazu gehören die Verwendung von spezifischen OCR-Engines, die Anpassung von Schwellenwerten für die Texterkennung und die Verwendung von spezifischen Wörterbüchern.
Verwendung von OCR-Optimierer: es gibt auch OCR-Optimierer Tools, die man verwenden kann um die Erkennungsgenauigkeit zu verbessern, wie z.B. Image cleaning tools die helfen können um Störfaktoren wie Rauschen, Schatten usw. zu eliminieren.
Post-Processing: Nachdem die OCR ausgeführt wurde, kann man mithilfe von Text-Processing-Tools, wie z.B. Regex, die Erkennungsgenauigkeit verbessern.
Es ist wichtig zu beachten, dass die beste Methode zur Verbesserung der Genauigkeit von Tesseract OCR von den spezifischen Anforderungen und Eigenschaften des Bildes oder der PDF-Datei abhängt. Es ist ratsam, mehrere Methoden auszuprobieren und die Ergebnisse zu vergleichen, um die beste Lösung zu finden.
https://www.heise.de/ct/artikel/Toolbox-Texterkennung-mit-Tesseract-OCR-1674881.html
Tails Linux, or just Tails, is a live operating system based on Debian designed to protect your privacy and anonymity. You can boot it from your DVD and USB thumb drive or run it inside a virtual machine. It routes all your data through the Tor Network. In this tutorial, I’m going to show you how to run the Tails live image inside Virtualbox. Tails is an abbreviation of The Amnesic Incognito Live System…
The benefit of using a live operating system such as Tails is that they preconfigured to make sure that there are no trace left on your device
– Linux Babe
source: https://www.linuxbabe.com/desktop-linux/how-to-run-tails-linux-inside-virtualbox
Blocks unkown usb stick which could be used to perform a rubber ducky attack
Install USBGuard by running the command “sudo apt install usbguardv
” in the terminal.
To configure USBGuard, open the configuration file located at /etc/usbguard/usbguard-daemon.conf
and make any necessary changes to the settings.
Start the USBGuard service by running the command “sudo systemctl start usbguard
“
To make USBGuard start automatically at boot, run the command “sudo systemctl enable usbguard
“
To view the current status of USBGuard, run the commands “sudo systemctl status usbguard
“
To create or modify rules for USB devices, use the command “sudo usbguard generate-policy > /etc/usbguard/rules.conf
“
To reload the rules without restarting the service use “sudo usbguard reload-policy
“
To check the USB devices connected and its current status, use “sudo usbguard list-devices
“
Note: The above steps are the basic steps to use USBGuard on Ubuntu 22.04. It's recommended to read the official documentation for more detailed instructions.
sudo systemctl start usbguard
sudo usbguard list-rules
To allow all currently connected USB devices using USBGuard, you can use the usbguard allow-device command with the --present
option. This will create a rule that allows any USB device that is currently connected to the computer.
For example, to allow all currently connected USB devices, you can run the following command:
sudo usbguard allow-device --present
This will create a rule that allows all currently connected USB devices, and any future devices that match the same criteria.
You can also specify additional criteria to restrict the rule to a specific subset of devices. For example, you can allow only USB devices with a specific vendor or product ID by using the --vendor-id
and --product-id
options.
sudo usbguard allow-device --present --vendor-id 0x1234 --product-id 0x5678
This will create a rule that allows any currently connected USB device with the vendor ID 0x1234 and the product ID 0x5678. You can find the vendor and product IDs for a specific device by running the lsusb command and looking for the idVendor and idProduct fields in the output. You can use the usbguard list-rules command to view the current set of rules and verify that the rule you created has been added.
sudo usbguard list-rules
Keep in mind that the allow-device command creates a permanent rule that will remain in effect even after the device is disconnected. If you want to allow a device temporarily and have the rule automatically expire when the device is disconnected, you can use the usbguard temporary-allow command instead.
sudo usbguard temporary-allow --vendor-id 0x1234 --product-id 0x5678
This will create a temporary rule that allows the specified device for a default duration of 5 minutes. You can use the —duration option to specify a different duration in seconds.
sudo usbguard temporary-allow --vendor-id 0x1234 --product-id 0x5678 --duration 600
This will create a temporary rule that allows the specified device for a duration of 10 minutes (600 seconds).
To deny all USB devices using USBGuard, you can use the usbguard insert-rule command with the —rule deny option. This will create a rule that denies all USB devices by default. For example, to deny all USB devices, you can run the following command:
sudo usbguard insert-rule --rule deny
This will create a rule at the top of the rule list that denies all USB devices. Any devices that are currently connected will be disconnected, and any future devices that are connected will be denied automatically. You can use the usbguard list-rules command to view the current set of rules and verify that the rule you created has been added. Copy code
sudo usbguard list-rules
Keep in mind that the insert-rule command creates a permanent rule that will remain in effect even after the devices are disconnected. If you want to deny a device temporarily and have the rule automatically expire when the device is disconnected, you can use the usbguard temporary-deny command instead.
sudo usbguard temporary-deny
This will create a temporary rule that denies all USB devices for a default duration of 5 minutes. You can use the —duration option to specify a different duration in seconds.
sudo usbguard temporary-deny —duration 600
This will create a temporary rule that denies all USB devices for a duration of 10 minutes (600 seconds).
Note that the temporary-deny command will not affect devices that are already connected. To disconnect a device that is currently connected, you can use the usbguard remove-device command.
sudo usbguard remove-device <device-id>
Replace <device-id>
with the ID of the device that you want to disconnect. You can use the usbguard list-devices command to view the list of currently connected devices and their IDs.
sudo usbguard list-devices
how to revoke all granted permissions
To revoke all granted permissions for USB devices using USBGuard, you can use the usbguard delete-rule
command with the --rule
allow option. This will delete all rules that allow access to USB devices.
For example, to revoke all granted permissions for USB devices, you can run the following command:
sudo usbguard delete-rule --rule allow
This will delete all rules in the rule list that allow access to USB devices. Any devices that are currently connected and were granted access by a deleted rule will be disconnected, and any future devices that match the deleted rules will be denied automatically. You can use the usbguard list-rules command to view the current set of rules and verify that the rules you want to delete have been removed.
sudo usbguard list-rules
Keep in mind that the delete-rule command only affects permanent rules that were created using the usbguard insert-rule or usbguard allow-device commands. Temporary rules that were created using the usbguard temporary-allow command will expire automatically after the specified duration, and do not need to be deleted manually. If you want to revoke all temporary permissions for USB devices, you can use the usbguard delete-temporary-rules command.
sudo usbguard delete-temporary-rules
This will delete all temporary rules in the rule list that allow access to USB devices. Any devices that were granted access by a deleted temporary rule will be disconnected.
Note that the delete-rule and delete-temporary-rules commands do not affect rules that deny access to USB devices. If you want to revoke all denied permissions as well, you can use the usbguard delete-rule command with the —rule deny option to delete all rules that deny access to USB devices.
sudo usbguard delete-rule --rule deny
This will delete all rules in the rule list that deny access to USB devices. Any devices that were denied access by a deleted rule will be disconnected, and any future devices will be allowed automatically. do I need to reload the systemd daemon for those changes to take effect? After making changes to the USBGuard rules, you do not need to reload the systemd daemon in order for the changes to take effect. The changes will be applied automatically by the USBGuard service. You can use the systemctl command to check the status of the USBGuard service and verify that it is running.
systemctl status usbguard
If the USBGuard service is not running, you can start it by running the following command:
sudo systemctl start usbguard
You can also use the usbguard command-line utility to view the current set of rules and verify that the changes you made have been applied.
sudo usbguard list-rules
If you made changes to the rules but they are not being applied as expected, you may need to check the USBGuard logs to troubleshoot the issue. You can view the USBGuard logs by running the following command:
sudo journalctl -u usbguard
This will display the logs for the USBGuard service, which may contain information about any errors or issues that are preventing the changes from being applied.
source: https://infosec-handbook.eu/blog/tool-usbguard/
The link above is dead/defunct, but the wayback machine has us covered ;)
https://web.archive.org/web/20210216143433/https://infosec-handbook.eu/blog/tool-usbguard/