Amazon ECS Now Allows Two Additional Docker Flags

You can now specify two new docker flags as parameters in your Amazon Elastic Container Service (ECS) Task Definition. These flags are pidMode and ipcMode.

The pidMode parameter allows you to configure your containers to share their process ID (PID) namespace with other containers in the task, or with the host. Sharing the PID namespace enables for example monitoring applications deployed as containers to access information about other applications running in the same task or host.

The ipcMode parameter allows you to configure your containers to share their inter-process communication (IPC) namespace with the other containers in the task, or with the host. The IPC namespace allows containers to communicate directly through shared-memory with other containers running in the same task or host.

This feature is currently supported with EC2 launch-type. For more information about using Docker parameters in task definitions, visit the Amazon ECS documentation.

To view where Amazon ECS is avaiable, please visit our region table.

Source

Tool to Securely Transfer Files Between Linux Computers

DCP tool securely transfer files linux

Transfer files remotely has for a long time been a reserve of rsync and SCP protocols. In this article, we will take a look at how you can transfer files between Linux computers using dcp tool. dcp tool is a handy tool that copies files between host machines in a network using the DAT network. In this guide, we will try to remotely copy files between two Ubuntu/Debian Systems.

System SetUp

We are going to demonstrate the remote copying of files using two Debian hosts:

  1. Host A – IP 10.200.50.50 ( This system will host files to be sent remotely to another host system)
  2. Host B – IP 10.200.50.51 (This will be the System where files will be transferred/copied to)

How dcp works

Dcp tool creates a dat archive for a specified group of files or directories. Using a generated public key, dcp allows you to download the said archive from the second host system. Data shared over the network is encrypted using the archive’s public key, so you don’t need to worry about the security of your data. Data will only be limited to those who have access to the key.

Software Prerequisites

To successfully install the dcp tool, the following software packages are required on both host systems

  • NodeJS
  • NPM

Installing NodeJS

To install NodeJS, we are going to add Node.js PPA to our host machines. The PPA is provided by the Official Nodejs website. In addition, we are going to install the software-properties-common package.

Log in to each of the systems and follow the steps below

Install software-properties-common package

Run the command below

# sudo apt-get install curl software-properties-common

Sample Output

remotely copy files using dcp

Next, Add the required PPA file to allow you to install Node.JS

Run the command below to add PPA

# curl -sL https://deb.nodesource.com/setup_11.x | sudo bash –

Finally, let’s install the Node.JS package which will also come with NPM

Install Node.JS package

# sudo apt-get install -y nodejs

Sample Output

Verifying installation of Node.JS and NPM

To verify installation of Node.JS

# node -v

To verify installation of NPM

# npm -v

Now that we have our software prerequisites, let’s proceed and install dcp

Install dcp tool

To install the dcp tool run

npm i -g dat-cp

Sample output

To verify that all went OK, let’s check out the version of the dcp tool

dcp –version

OR

dcp -V

Output

0.6.2

Great! Let’s create a few files on our source system and try and send them over the network to the second host.

# touch file1.txt file2.txt file3.txt

How to remotely transfer/copy files

To remotely copy the files to another host , run the following command

dcp file1.txt file2.txt file3.txt

This will generate a public key at the bottom as shown in cyan color.

Copy the key and paste it on the remote server as shown

Congratulations! You have successfully copied files from one host to another using the dcp tool.

To find more information about the tool’s usage run

dcp –help

OR

dcp -h

That’s it for today guys. I hope you found this guide helpful. Feel free to comment and share. Thanks!

Read Also:

Source

Download Baobab Linux 3.31.1

Baobab (also known as Disk Usage Analyzer) is an open source application that allows users to analyse the disk usage under the GNOME desktop environment. It can scan multiple device drives, as well as local, remote and external user-requested folders and devices.

The application’s main goal is to help users view how they are using the storage space of a HDD (Hard Disk Drive), SSD (Solid Disk Drive), USB flash drive, memory cards, and digital cameras.

Its user interface is extremely easy to use, especially because it follows the GNOME HIG (Human Interface Guidelines). It provides users with a list of the devices and specific directories that can be scanned.

Getting started with Baobab

After a scan, users can decide if a specific directory should be deleted, moved or archived, in order to free up space. The results are also very useful if you want to estimate the total required space for a backup.

If a device or a folder is locked or encrypted, the application will automatically detect it and will ask the user for a password. When a scan is complete, it will display a graphical chart with each scanned folder.

Users can choose to scan either their Home directory, the entire filesystem and an attached disk drive (if available). In addition, they can also scan a specific directory (including subdirectories) or a remote folder, simply by clicking the gear button on main toolbar.

In order to scan a remote directory, the application will require the IP address of the remote machine. It supports SMB (Samba shared folders from other OSes, such as Microsoft Windows) and keeps a history of previous connections.

Bottom line

All in all, Baobab or Disk Usage Analyzer is a great and easy to use application for the GNOME desktop environment. It helps you to quickly analyze the usage of specific folder and device.

Analyse directory trees File management Directory analizer Disk Directory Analyze Analyzer

Source

Yes We Can: Technical Documentation with DAPS for DocBook and AsciiDoc

DocBook Authoring and Publishing Suite: A Fully-Fledged Authoring and Content Management System for Documentation Projects

If you are working in technical communication, banking on DocBook for your documentation projects comes with many advantages. However, over the past few years, software documentation projects started to move from DocBook to AsciiDoc, a lightweight markup language, as the document format. This is partly due to the ever-growing complexity of IT solutions and the need to involve external experts (not having a technical writing background) into documentation efforts.

Such a move usually not only requires converting the DocBook sources to AsciiDoc, but also changing the project setup, the toolchain and writing new stylesheets.

But we have good news: The new AsciiDoc support in the DocBook Authoring and Publishing Suite (DAPS) saves you from switching to a new toolchain and new stylesheets. Whether you convert an existing DAPS project from DocBook to AsciiDoc, or whether you have used DAPS before and are starting an AsciiDoc project from scratch, DAPS lets you use the:

  • existing XSLT stylesheets (for converting DocBook into PDF, HTML, ePUB, etc.)
  • same DAPS commands as with DocBook projects
  • same project setup as with DocBook projects

Advantages of DocBook for Large Documentation Projects

DocBook is the ideal framework when it comes to publishing large documentation projects in different formats. The DocBook project consists of a language (DocBook XML) and a set of stylesheets to translate this language into different output formats such as HTML, PDF, and EPUB.

The stylesheets define the layout you want to apply when transforming the XML sources into output formats. You can use the stylesheets included with DocBook, or you can write your own XSLT stylesheets to ensure your corporate design is properly reflected.

The language DocBook XML is based on the eXtensible Markup Language (XML) and defines the content in a semantic way through elements like in HTML. DocBook itself is written as a schema that defines the element names and the content and where they can appear. The DocBook schema is used to fulfill two tasks: guided editing and validation.

Guided editing is done via an XML editor (and there are many choices, from XML-focused editors such as oXygen to general programming editors such as Emacs). The editor reads in the DocBook schema and suggests which elements are allowed in the current context. This is similar to sorting objects into drawers according to their function: For example, you place screwdriver and hammer into a drawer labeled Tools, whereas you place teddy bears and building blocks into a drawer labeled Toys. Similarly, when writing documents with DocBook, you would “sort” the author’s name into an XML tag called author, whereas you would “sort” a table into an XML element called table. Validation gives hints about structural errors in an XML document; this could, for example, be a missing element.

Similar products often share a considerable amount of features and differ in details only. If you want to generate multiple documentation variants from your XML files, you can do so with the help of conditional text – or profiling, as it is called in DocBook. For example, you can profile certain parts of your XML texts for different (processor) architectures, operating systems, vendors or target groups.

While learning DocBook XML might seem cumbersome at first sight, it comes with many unique advantages. Among others, it is ideal for the modular structures of complex documentation, it provides profiling, and you can generate many different output formats from the same XML sources.

Contribute to Documentation: AsciiDoc as Convenient Alternative

However, in the age of Cloud, “X as a Service” and “Y as a Platform”, technical projects become more and more complex. In consequence, documentation projects are reliant on contributions from external experts, such as engineers working on new technologies, consultants implementing product and solution stacks onsite at a customer’s, and many others. They don’t have a technical writing background, but they have to deliver specific content. And they don’t have any time at all to deep-dive into a writing language just to provide some documents.

For those projects and contributors, AsciiDoc offers a serious alternative. AsciiDoc belongs to the lightweight markup languages and provides a plain text documentation syntax and processor. It is not as modular and extensive as DocBook, but it is easy to understand and to use.

One of the biggest advantages of using AsciiDoc as a source for documentation is its seamless integration with GitHub. GitHub not only renders AsciiDoc sources, but also allows to edit them directly in the Web interface. This fits nicely with GitHub‘s Web-based pull request workflow: You edit the document online, click a button, and someone else (usually the repository owner) can review and integrate the change. All you need is a free GitHub account (which many developers and technical experts already have). This improves the contribution flow for external contributors.

DAPS Adds AsciiDoc Support

Transforming the XML sources to output formats such as PDF, requires several steps such as validating, filtering (profiling), converting images, and generating a .fo file. As the DocBook project does not provide a standard tool chain, custom solutions (written with make, ant or a scripting language) are necessary for publishing your DocBook documentation projects. That is a major hurdle for writers who would like to use DocBook. The DocBook Authoring and Publishing Suite, originally developed by me, with lots of contributions by Thomas Schraitle, fills this gap by providing a tool set for easy creation and publication of DocBook sources on Linux.

DAPS helps technical writers in the editing, translation and publishing process for documentation written in DocBook XML. DAPS is a command line based software for Linux and lets you create HTML, PDF, EPUB, man pages, and other formats with a single command. It automatically takes care of validating and profiling your sources and of converting the images into the format best suited for the selected output format. DAPS also allows you to manage the key tasks related to writing and editing, create profiled source tarballs for translation or review. DAPS supports authors by providing link checker, validator, spellchecker, and editor macros. Thus it is perfectly suited to manage large documentation projects with multiple authors.

Starting with version 3.0, DAPS supports also AsciiDoc sources. AsciiDoc sources are converted to DocBook and then processed the same way as DocBook sources. Projects with AsciiDoc sources are handled the same way as regular DocBook projects. Therefore, the full range of output formats supported by DAPS is supported also for AsciiDoc sources (HTML, single HTML, PDF, EPUB, plain text, etc.).

DAPS is released as open source. It offers a dual-licensing model at your choice (GPL 2.0 or GPL 3.0) and can be installed and used on any modern Linux system. DAPS packages are available for SUSE Linux Enterprise and for openSUSE, and previous versions of DAPS have successfully been tested and used on Fedora, Ubuntu, Xubuntu, and Debian.

Together with a text editor and a version management system such as Git, DAPS can be used as a fully-fledged authoring and content management system for documentation projects based on DocBook and AsciiDoc.

Curious? Want to try it yourself now? Check out the latest DAPS version, the most recent changes and the documentation and share your feedback with us – just send an email to doc-team@suse.com.

Share with friends and colleagues on social media

Source

LF Networking Approaches Inaugural Year With Addition of New Members

Globo.com, Packet, PANTHEON.tech and RIFT Inc. Join More Than 100 Leading Technology Organizations to Further Open Source, Open Standards-Based Networking Technologies

San Francisco – November 20, 2018 — The LF Networking Fund (LFN), which facilitates collaboration and operational excellence across open networking projects, today announced the addition of four new members, continuing its rapid global growth. Welcoming new members Packet, PANTHEON.tech and RIFT, Inc. extends LFN’s first year momentum, and sets the stage for accelerated development and adoption of open source and open standards-based networking technologies in next year.

“Industry acceptance and participation this year have been tremendous and validate that businesses see an open source, open standards-based future for networking technologies,” said Arpit Joshipura, general manager, Networking and Orchestration, The Linux Foundation. “In 2019, the combined efforts of our growing community will continue to accelerate harmonization of open source and open standards-based networking technologies that will define tomorrow’s networks.”

The newest members will work with more than 100 other technology leaders to drive greater harmonization and development of LFN’s networking projects, including FD.io, ONAP, Open Daylight, OPNFV, PNDA, and Tungsten Fabric. LFN enables open source networking technologies by integrating the governance of participating projects in order to enhance operational excellence, simplify member engagement, and increase collaboration. Globo.com, Packet, PANTHEON.tech and RIFT, Inc. join as Silver members.

The LFN Community will come together at KubeCon and ContainerCon North America on December 10-13 in Seattle, Washington. LFN’s onsite presence includes a FDio Mini Summit and all-LFN member evening reception on December 10 featuring ONAP, OpenDaylight, OPNFV, FD.io, PNDA, and Tungsten Fabric. Heather Kirksey will also give a presentation on Thursday, December 13 titled “The Telco Networking Journey to Cloud Native: The Good, Bad, and Ugly.” Find additional details on LFN’s presence at KubeCon here.

Member Supporting Quotes:

“Becoming a member of ONF, CNC and the Linux Foundation is a recognition of the passion and commitment of Globo.com with the OSS community. We firmly believe that the ability to handle infrastructure as code, software-defined networks, and scalable applications is vital to the dynamic environment and will be instrumental in supporting our business and driving innovation in the digital media market in which we are included.”

“Networking is going through tremendous transformation, driven by the need for automation and the disaggregation of hardware and software,” said Ihab Tarazi, CTO of Packet. “We see great opportunities in collaborating with the LF Community to accelerate our innovation and solving the hard problems of extending cloud automation to the edge.”

“PANTHEON.tech is committed to accelerate networking innovation by joining LFN as a Silver Member,” said Tomáš Jančo, CEO, PANTHEON.tech. “As an organization with 17 years of experience, we are eager to share our advancements in developing cohesive software solutions across the LF Networking projects at the bleeding edge.”

“Proprietary management and automation approaches have impeded NFV deployments,” said Matt Harper, RIFT’s CTO. “Open source communities (such as ONAP) play a key role in validating interoperability and creating best-of-breed de-facto standards. We are excited to be working with the Linux Foundation and ONAP to evolve NFV technology to cultivate a robust and interoperable commercial NFV ecosystem.”

About the Newest LFN Members:

Globo.com provides digital platforms and services for Brazil’s Grupo Globo, connecting online audiences to the diverse array of publishing, video and data properties Grupo Globo operates, including Globo TV’s broadcast networks and over-the-top television service Globo Play. As part of its services, Globo.com provides LIVE stream and VOD services for programs produced by more than 100 affiliates across Brazil.

Packet is the leading bare metal automation platform for developers. Its proprietary technology automates physical servers and networks without the use of virtualization or multi-tenancy, powering over 60k deploys each month across its 18 global datacenters. Founded in 2014, Packet has quickly become a provider of choice for leading enterprises, SaaS companies, and software innovators. In addition to its bare metal public cloud, Packet offers a custom “Private Deployment” model that automates infrastructure in customer-owned locations.

PANTHEON.tech is a research & development software company, delivering managed projects to its clients, primarily oriented atnetwork technologies and prototype software development with a focus on SDN, NFV, Automotive and Smart Cities. The company has deep expertise in many open-source networking technologies, including OpenDaylight, ONAP, VPP, FD.io, PNDA, Sysrepo, Honeycomb, networking for CNCF and others. This includes PANTHEON.tech’s OpenDaylight-based open source SDN SDK toolkit, lighty.io, designed to support, ease and accelerate development of Software-defined Networking solutions in Java, Python and Go.

RIFT, Inc provides an open sourced and standards-based platform designed to automate the deployment and operation of virtualized network services and functions. RIFT’s technology, RIFT.wareTM, and RIFT services accelerate service providers’ efforts to virtualize cloud-based communication services. RIFT.ware empowers enterprises to successfully deploy virtualized network services on private and hybrid cloud, and, NFV-enabled virtualized networks. Any network application built with RIFT technology can intelligently take advantage of any cloud’s unique capabilities and operate at any scale. RIFT, Inc is a privately held, global company with offices in the United States and India.

About The Linux Foundation

The Linux Foundation is the organization of choice for the world’s top developers and companies to build ecosystems that accelerate open technology development and industry adoption. Together with the worldwide open source community, it is solving the hardest technology problems by creating the largest shared technology investment in history. Founded in 2000, The Linux Foundation today provides tools, training and events to scale any open source project, which together deliver an economic impact not achievable by any one company. More information can be found at www.linuxfoundation.org.

###

The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our trademark usage page: https://www.linuxfoundation.org/trademark-usage. Linux is a registered trademark of Linus Torvalds.

Source

Home Assistant: The Python Approach to Home Automation | Linux.com

A number of home automation platforms support Python as an extension, but if you’re a real Python fiend, you’ll probably want Home Assistant, which places the programming language front and center. Paulus Schoutsen created Home Assistant in 2013 “as a simple script to turn on the lights when the sun was setting,” as he told attendees of his 2016 Embedded Linux Conference and Open IoT conference presentation. (You can watch the complete video below.)

Schoutsen, who works as a senior software engineer for AppFolio in San Diego, has attracted 20 active contributors to the project. Home Assistant is now fairly mature, with updates every two weeks and support for more than 240 different smart devices and services. The open source (MIT license) software runs on anything that can run Python 3, from desktop PCs to a Raspberry Pi, and counts thousands of users around the world.

Like most automation systems, Home Assistant offers mobile and desktop browser clients to control smart home devices from afar. It differs from most commercial offerings, however, in that it has no hub appliance, which means there are no built-in radios. You can add the precisely those radios you want, however, using USB sticks. There’s also no cloud component, but Schoutsen argues that any functionality you might sacrifice because of this is more than matched by better security, privacy, and resiliency.

“There is no dependency on a cloud provider,” said Schoutsen. “Even when the Internet goes down, the home doesn’t shut down, and your very private data stays in your home.”

Schoutsen did not offer much of a promo in his presentation, but quickly set to work explaining how the platform works. Since Home Assistant is not radically different from other IoT frameworks — one reason why it interfaces easily with platforms ranging from Nest to Arduino to Kodi — the presentation is a useful introduction to IoT concepts.

To get a better sense of Home Assistant’s strengths, I recently asked Schoutsen for his elevator pitch. He highlighted the free, open source nature of the software, as well as the privacy and security of a local solution. He also noted the ease of setup and discovery, and the strength of the underlying Python language.

Easy Extensions

“Python makes it very easy to extend the system,” Schoutsen told me. “As a dynamic language it allows a flexibility that Java developers can only dream off. It is very easy to test out and prototype new pieces on an existing installation without breaking things permanently. With the recent introduction of MicroPython, which runs on embedded systems as Arduino and ESP8266, we can offer a single language for all levels of IoT: from sensors to automation to integration with third-party services.”

In Schoutsen’s ELC 2016 presentation, he described how Home Assistant is an event-driven program that incorporates a state machine that keeps track of “entities” — all the selected devices and people you want to track. Each entity has an identifier, a state condition, and attributes. The latter describes more about the state, such as the color and intensity of the light on a Philips Hue smart bulb.

To integrate a Philips Hue into the system, for example, you would need to use a light “component,” which is aware of the bulb and how to read its state (off or on). Home Assistant offers components for every supported device or service, as well as easy access to component groups such as lights, thermostats, switches, and garage doors. Setup is eased with a network discovery component that scans the network and, if you have a supported device, sets it up automatically.

The software is further equipped with a service registry, which provides services over the event bus. “We can register the turn-on command for a light, and have it send an email or SMS,” said Schoutsen. “A timer can send a time change event every second, and a component can ask to be notified at a particular time, or in intervals. Based on time change events, it will trigger the callback of the components.”

Each component writes its state to the state machine, emitting a state change event to the event bus. “The light component would register its turn on service inside the service registry so that anyone could fire an event to the event bus to turn on the light,” said Schoutsen.

You can easily integrate a light component with a motion detector component using an automation component. This would listen to the motion detector events, and fire a “turn light on” event to the event bus, which in turn would be forwarded to the service registry. The registry would then check to see that the light component can handle the event. “Automation components can listen for events, observe certain attribute states or triggers, and act on them,” explained Schoutsen.

Another component type handles presence detection. “The platform can check the router to see which phones are connected in order to see who is home,” said Schoutsen. “Other components are responsible for recording event and state history, or for entity organization — grouping multiple entities and summarizing their state.” Components are available for integrating third party services, such as MQTT or IFTTT, and other components export data to external databases and analysis tools.

Schoutsen went on to explain concepts such as a “platform” layer that sits above the entity components. Each platform integrates an “abstract base class,” which “acts as the glue between the real device and the one represented in Home Assistant,” said Schoutsen. Later, he ran through a code example for a basic switch and explored the use of trigger zones for geofencing.

As Schoutsen says, Home Assistant is “gaining a lot of traction.” Check out the complete video to see what happens when Python meets IoT.

Source

How To Remove Yourself From Popular People Search Engines (Opt Out)

Last updated: Nov 19 2018

Today you’ll learn how to opt-out and remove yourself from people search engine sites.

The opt-out procedures will be shown at the bottom of this post, for those who want to skip ahead.

In case you didn’t know.

Your sensitive personal information, including your name, phone number, home address and even financial records are visible on the web.

This means anyone can access that information if they wanted to.

If that doesn’t scare you. Something common amongst internet trolls and cybercriminals is what’s called doxxing.

In essence, doxxing is when an attacker will threaten to leak or expose your personal information to the world if you fail to meet their demand.

The bad news:

Doxxers, criminals and internet trolls don’t have to work very hard in order to find information about their victims. And it’s all thanks to people search sites.

If you’ve never heard of people search sites or people search engines.

It’s a website that allows anyone to freely look up information about specific individuals. Hence the term: people search engines.

Such sites were designed to make it easy for people to find long lost relatives, friends or family. But of course, as you may have guessed, many people have been using it for more nefarious purposes.

Popular Free People Search Sites

There are many people search sites on the web.

If you’ve ever used one before, you’d know that most of them require a payment to view the information.

But there’s also a few sites which are free and provide accurate data.

A very popular one you might’ve heard of is WhitePages.​

Other alternatives to WhitePages:

I have provided the steps to opt out from these sites at the end of this post.

How Do People Search Sites Obtain My Information?

These websites obtain our information in a variety of ways, both offline and online.

And believe it or not, these companies don’t even need to put a gun to our heads to obtain our information.

Why? Because we’re already giving it away freely!

Such as when you fill out a form or a survey or when you make a purchase or when you register for promotional material.

The details you submit in those forms you fill out are stored and shared with third parties without your knowledge.

That’s why if you’ve ever signed up for a free offer, and a few days later, you started receiving more offers about a similar service.

In addition.

Most information is taken from public sources including (but not limited to):

  • Telephone directories
  • Business data
  • Property listings
  • Vehicle records
  • Social networking sites
  • Online directories, blogs and forums

Each time you fill out and submit a form with your personal details – there’s always a possibility your data will be shared and resold.

How To Protect Yourself and Your Personal Info (online and offline)

In today’s digital age, people are freely broadcasting and sharing information about themselves online.

Social media, for example, is the best place to find information about people, especially since almost everyone you know has one.

Social media sites is also where, people search engines like WhitePages, like to obtain information about people.

In addition, many employers will use social media to look up a person before hiring them, just to see who they really are underneath – another reason why to be careful with what you share online.

In short.

The more social media profiles you have and the more active you are on the internet, the easier it is for people to find and track your digital footprints.

The good news:

There are steps you can take to reduce your digital footprint and protect yourself online and offline.

Here’s how:

  • Use multiple email accounts each with a different alias (i.e. don’t use the same email for banking and for shopping, etc)
  • When in doubt, use a fake identity when signing up for random and irrelevant things.
  • Use a temporary email for non-important, temporary stuff (i.e. when signing up for free offers or creating an account on a random website)
  • Don’t give out your personal information to anyone, online and offline (unless you’re 100% sure you trust the other party).
  • Be careful what you share on social media and on the internet in general. Anything you share online will remain online forever.
  • Always read the privacy policy and terms of services before committing to anything.
  • Use cash or disposable credit cards for most online and offline purchases to minimize your footprints and prevent tracking.
  • Practice safe online browsing habits. Use browser extensions that block tracking, clear your cookies regularly, avoid linking accounts together.

How To Accurately Find Information About You on Google

If you don’t find any traces of your identity on most people search sites, I wouldn’t break out the champagne bottle just yet.

Another method used to find information about anything, including a person is through Google.

Google has what’s known as Advanced Search Operators which allow you to narrow down your searches to exact keywords or phrases.

Of course, this method won’t show you all your data (if any), only the pages that have been indexed by Google.

Here’s how to do it:

First go on google and type the following:

inurl:”username”

This will show you a list of websites that contain the word/phrase “username” in the URL.

Go ahead and replace “username” with your username or an online alias that you use, and see what you find.

Here are other search operators you can try for yourself:

“exact phrase” Find all pages that contain the exact phrase in that order
(eg. “john snow”)
inurl:”username” Find all pages with “username” in the URL
intitle:”john snow” Find all pages that contain “john snow” in the page title
intext:”home address” Find all pages that have “..” in the body text of a page

PRO TIP
It’s bad privacy practice to use the same username on multiple websites/platforms. Doing so will make it easier to find you online.

Those are just some example as to how powerful advanced searches can be when used correctly.

How To Opt Out From Popular People Search Sites

Now I’ll be showing you how to remove your profile from some of the most popular people search sites.

Something to keep in mind:

Removing yourself from these sites don’t guarantee your data will be removed forever.

In fact, it’s almost certain it will re-appear again in the future, and sometimes in different variations.

For as long as our information is being collected, there’s always going to be a possibility that we’ll end up again on one or most of these sites.

This is why you must set time to repeat this process on a regular basis.

WhitePages

WhitePages is perhaps the most popular people search site on the web. You can find information about people and businesses. Here’s how to remove yourself from whitepages.

You do have to create an account in order to opt-out.

  1. ​​​​Search yourself on WhitePages, then copy the URL of your profile. It should look like this:
    http://www.whitepages.com/name/John-Snow/City-ST/b8921x2
  2. Create an account (if you haven’t already). Then scroll to the footer (bottom) menu and click “Remove From Directory”. Then paste the URL of your profile.
  3. For the last step, they need to verify your identity via automated call. Don’t worry, you just have to press a number and that’s it. No need to talk to humans.

Intelius

Intelius is another popular people search site where you can perform comprehensive background checks. To remove your profile, you can do it via fax, post mail or through their website. Intelius has a more strict opt-out procedure as they require proof of identification such as an ID or driver’s license.

  1. Go to the Intelius opt out page.
  2. Take a picture of your driver’s license. Then as required, cross out your photo and driver’s license number.
  3. Click “Browse” then upload your photo ID. To be notified when your listing has been removed, enter your email.

Spokeo

In addition to name, phone and address search, Spokeo lets you find social media profiles and pictures that are tied to an email address. The opt-out procedure for Spokeo is fairly simple.

  1. Search yourself on Spokeo and then copy the URL of your profile. It should look like this:https://www.spokeo.com/John-Snow/State/City/p80085..
  2. Then go to the opt-out page and enter the URL of your profile.
  3. Enter your email then click “Send Verification Email”. Then check your email and click “Verify Opt Out”.

BeenVerified

If you have multiple profiles on BeenVerified, you have to reach out to them and tell them to remove another listing because they only allow you to opt-out once per email.

  1. Go to BeenVerified opt-out page, where you’ll be asked to search yourself.
  2. Then find your profile(s), then click “That’s The One”.
  3. Enter your email then click “Send Verification Email”. Next, check your email and click “Verify Opt Out”.

FamilyTreeNow

FamilyTreeNow is perhaps the most accurate one of them all, at least from my experience. They show not only accurate information about you, your family, and people you associate with, but they also hold data from decades ago.

  1. Go to the opt-out page of FamilyTreeNow, and click “Begin opt-out procedure.”
  2. You’ll be asked to search yourself.
  3. Click on your profile(s), make sure it’s you, then click the red button that says “Opt Out”.

InstantCheckMate

InstantCheckMate is used for performing background checks. The loading takes quite a while but the information is almost always accurate. They let you opt-out via post mail or through their website.

  1. Go to the opt-out page of InstantCheckMate
  2. Fill out the form using the exact information shown on their site.
  3. To remove multiple profile listings, you’ll need to re-submit multiple forms.

PeekYou

PeekYou is particularly useful for finding social media profiles of people using their username or an alias they go. Here’s how to remove yourself from peekyou:

  1. Search yourself on PeekYou and then copy the unique ID of your profile, which is the last digits shown in the URL that looks like this:
    http://www.peekyou.com/donald_trump/80153811
  2. Go to PeekYou opt-out page then enter your information.
  3. For actions, select “Remove My Entire Listing”, followed by the reason for removal. Then enter the unique ID of your profile then click “Submit”.

Pipl

Pipl is a little different since they don’t give you an option to opt-out. If your information is shown on their site, that’s because it’s available from other sources. If you look yourself up, they tell you where exactly they’re getting your information from.

Once you remove your data from those sites, your listing on Pipl will be removed.

  1. Go to pipl and look yourself up.
  2. On the results page, click on your name then scroll down till you see a blue box that looks like the one in the image shown below.
  3. Here, you’ll see a list of websites where Pipl is getting their information from. Your job now is to contact those sites and find out how to remove your data.

You can use this email script to contact the website owner and ask them to remove your profile.

Overall, privacy is something that’s very rare to have on the internet.

Everything you do online is being tracked and saved in a database somewhere. If not by the websites you visit, by your internet service provider.

And as long as we’re online, our data will be collected.

Lastly.​

Do your loved ones a favor and remove their profile listings as well. Or better yet, share this article with them!

Source

AWS Server Migration Service Now Supports Hourly Replication Intervals

AWS Server Migration Service is an agentless service which makes it easier and faster for customers to migrate on-premises workloads to AWS from VMware vSphere and Microsoft Hyper-V environments. It allows customers to automate, schedule, and track incremental replications of live server volumes, making it easier to coordinate large-scale server migrations. Previously, customers could only choose between 12 and 24 hours as the interval for their incremental replications of live servers. With this announcement, customers are able to run their incremental replication jobs every hour.

This capability exists in all AWS Regions where AWS Server Migration Service is currently available. To learn more, visit AWS Server Migration Service (SMS).

Source

Install PDFtk on Ubuntu | Linux Hint

PDF is an integral part of our everyday life. It’s a document format that’s trusted by every single platform. Often times, important documents and books are in PDF format. It’s so widespread that without an appropriate PDF tool at hand, no system is complete. Ubuntu offers a great flexibility in terms of software availability. It’s also one of the most popular Linux distros for being so simple yet powerful and fast, extremely suitable for new to moderate Linux users. Let’s grab PDFtk – the ultimate PDF toolkit you’ll ever need!

There are 2 versions of PDFtk available – Free, Pro ($3.99) and Server. The Pro version offers all the additional features like rotating the PDF, stamping etc. The Server version is the command-line utility for performing various tasks.

PDFtk is available in the default Ubuntu software repository. However, on the latest Ubuntu releases, it’s not accessible directly. You have to use a little trick to get in on your system.

Method 1

Run the following commands –

sudo add-apt-repository ppa:malteworld/ppa
sudo apt update

Method 2

You can also download and build PDFtk by yourself. For doing so, you need the Java build tools and dependencies.

Run the following commands –

sudo apt install default-jre-headless libcommons-lang3-java libbcprov-java

sudo apt install git default-jdk-headless ant
libcommons-lang3-java libbcprov-java

git clone https://gitlab.com/pdftk-java/pdftk.git

cd pdftk
mkdir libs
ln -st libs /usr/share/java/.jar

ant jar
java -jar build/jar/pdftk.jar –help

Method 3 (recommended)

Install the PDFtk snap –

Note that this is the “Server” version of PDFtk.

Using PDFtk

After the installation is complete, check out the app working perfectly –

In fact, running this command will show a short guide you can use. For the long, in-depth guide, run the following command –

For checking out the guide later, export it to a text file –

pdftk –help > ~/Desktop/pdftk.txt

Here are some of the most used tasks you can do with PDFtk.

Encrypt a PDF (128-bit encryption)

pdftk dummy.pdf output dummy.128.pdf owner_pw foo user_pw 123

Decrypt a PDF

pdftk dummy.128.pdf input_pw 123 output dummy.unsecured.pdf

Join multiple PDFs into one

pdftk dummy1.pdf dummy2.pdf cat output dummy_merged.pdf

You can also use wildcard –

pdftk *.pdf cat output combined.pdf

Rotate PDF document (must be 1 page document)

# 90° clockwise rotate

pdftk dummy.pdf

cat

1east

2

-end output dummy_90.pdf

# 180° rotate
pdftk dummy.pdf cat 1-endsouth output dummy_180.pdf

Enjoy!

Source

Void Linux, Solus, Manjaro, Antergos, Sabayon & Clear Linux Put To A Performance Battle

 

 

Given last week’s new images release of the rolling-release, systemd-free, original-creation Void Linux I decided to take it for a spin with some fresh benchmarking as it had been two years or so since last trying out that Linux distribution with its XBPS packaging system. For seeing how the performance compares, I benchmarked it against some of the other primarily enthusiast/rolling-release/performant Linux distributions including Antergos, Clear Linux, Debian Buster Testing, Fedora Workstation 29, Manjaro 18.0, Sabayon Linux, Solus, and Ubuntu 18.10.

 

 

These nine Linux distributions were tested on the new Intel Core i9 9900K eight-core / sixteen-thread processor. The i9-9900K was running at its stock speeds with the ASUS PRIME Z390-A motherboard, 2 x 8GB DDR4-3000 memory, Samsung 970 EVO 256GB NVMe SSD, and Radeon RX Vega 56 graphics.

Each of the Linux distributions were tested out-of-the-box for seeing how they stack up against each other. All of the Linux distribution benchmarks were run via the open-source and fully-automated Phoronix Test Suite benchmarking software.

 


Source

WP2Social Auto Publish Powered By : XYZScripts.com