-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


today's leftovers


Posted by Roy Schestowitz on Jul 20, 2023,

updated Jul 21, 2023


7 of the Best Web Browsers for Linux

KDE: End of Akademy 2023 and KDE Gear 23.08 Branched



Whither Perl


↺ Whither Perl


> I recently spoke about the future of Perl at The Perl and Raku Conference. The slides are now available.



Portal: Prelude gets an NVIDIA RTX remaster, plus NVIDIA announced RTX IO


↺ Portal: Prelude gets an NVIDIA RTX remaster, plus NVIDIA announced RTX IO


> NVIDIA has announced another game to use NVIDIA RTX Remix to add in full Ray Tracing, this time it's a mod for the original Portal with Portal: Prelude RTX. Portal: Prelude is the highest rated mod for the original Portal and back in 2008 it came number 3 on Mod DB's Mod of the Year contest. To play it free, you need to own the original Portal.



Spotlight on SIG CLI


↺ Spotlight on SIG CLI


> In the world of Kubernetes, managing containerized applications at scale requires powerful and efficient tools. The command-line interface (CLI) is an integral part of any developer or operator’s toolkit, offering a convenient and flexible way to interact with a Kubernetes cluster.


> SIG CLI plays a crucial role in improving the Kubernetes CLI experience by focusing on the development and enhancement of kubectl, the primary command-line tool for Kubernetes.


> In this SIG CLI Spotlight, Arpit Agrawal, SIG ContribEx-Comms team member, talked with Katrina Verey, Tech Lead & Chair of SIG CLI,and Maciej Szulik, SIG CLI Batch Lead, about SIG CLI, current projects, challenges and how anyone can get involved.



Encryption, 80 years after the Enigma machine


↺ Encryption, 80 years after the Enigma machine


> Although the Enigma machine used polyalphabetic substitution encryption, it represented a significant advancement compared to classical polyalphabetic techniques. It used an electromechanical rotor mechanism that scrambled the 26 letters of the alphabet. In typical use, one person enters text on the Enigma’s keyboard and another person writes down which of the 26 lights above the keyboard is illuminated at each key press. The illuminated letters are the ciphertext. Entering ciphertext on the keyboard transforms it back into readable text. The intricate rotor mechanism enabled the use of an enormous number of different rules, making it extremely difficult to crack the code, which is only possible if the initial machine configuration is known. But small system issues, combined with several years of hard work, mathematical and computational advancements, and a dose of luck, ultimately cracked the Enigma code.


> One weakness of Enigma was the need to distribute machine configuration information (or keys) in advance, which carried the risk of potential interception. The challenge of securely exchanging keys was the next cryptography problem to address for enhanced system resilience. The solution came in the 1970s with the Diffie-Hellman key exchange protocol.



Passengers on MAS flights no longer required to turn off devices starting July 1


↺ Passengers on MAS flights no longer required to turn off devices starting July 1


> Airline gets regulatory approval from Civil Aviation Authority of Malaysia to enable Gate-to-Gate connectivity.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Thu Jun 13 18:31:07 2024