poke @ Savannah: poke-elf 1.0 released

I am happy to announce the first release of poke-elf, version 1.0.

The tarball poke-elf-1.0.tar.gz is now available at

https://ftp.gnu.org/gnu/poke/poke-elf-1.0.tar.gz.

> poke-elf (https://jemarch.net/poke-elf) is a full-fledged GNU poke pickle for editing ELF object

> files, executables, shared libraries and core dumps.  It supports

> many architectures and extensions.

>

> This pickle is part of the GNU poke project.

>

> GNU poke (https://jemarch.net/poke) is an interactive, extensible

> editor for binary data.  Not limited to editing basic entities such

> as bits and bytes, it provides a full-fledged procedural,

> interactive programming language designed to describe data

> structures and to operate on them.


Please send us comments, suggestions, bug reports, patches,

questions, complaints, bitcoins, or whatever, to poke-devel@gnu.org.

Happy ELF poking!

Jose E. Marchesi
Frankfurt am Main
30 March 2024

Maptwin: an 80s-era automotive navigation computer

Maptwin: an 80s-era automotive navigation computer
A couple of years ago, I imported a Japanese-market 4×4 van into the US; a 1996 Mitsubishi Delica. Based on the maps I found in the seat pocket and other clues, it seems to have spent its life at some city dweller’s cabin in the mountains around Fukushima, and only driven occasionally. Despite being over 25 years old, it only had 77,000 km on the odometer. The van had some interesting old tech installed in it: what appears to be a radar detector labeled “Super Eagle ✔️30” and a Panasonic-brand electronic toll collection device that you can insert a smart card into. One particularly noteworthy accessory that was available in mid-90s Delicas was a built-in karaoke machine for the rear passengers. Sadly, mine didn’t have that feature. But the most interesting accessory installed in the van was the Avco Maptwin Inter, which I immediately identified as some kind of electronic navigation aid, about which there is very little information available on the English-language internet. When I first saw the Maptwin, I had thought it might be some kind of proto-GPS that displayed latitude/longitude coordinates that you could look up on a paper map. Alas, it’s not that cool. It was not connected to any kind of antenna, and the electronics inside seem inadequate for the reception of a GPS signal. The Maptwin was, however, wired into an RPM counter that was attached between the transmission and the speedometer cable, presumably to delivery extremely accurate and convenient display of how many kilometers have been traveled since the display was last reset. What I’ve been able to learn is that the Maptwin is computer that was mostly used for rally race navigation, precursor to devices still available from manufacturers like Terra Trip. Now, the Mitsubishi Delica is about the best 4×4 minivan you can get, but it’s extremely slow and unwieldy at speed, so it would be pretty terrible for rally racing. My best guess is that the owner used this device as a navigation aid for overland exploration, as the name “Maptwin” implies, to augment the utility of a paper map. On the other hand, I found an article that indicates that some kinds of rallies were not high speed affairs, but rather accuracy-based navigation puzzles of sorts, so who knows? The Maptwin wasn’t working when I got the van, and I don’t know if it’s actually broken or just needs to be wired up correctly. If any OSNews readers have any additional information about any of the devices I’ve mentioned, please enlighten us in the comments. If anyone would like to try to get the Maptwin working and report back, please let me know.

Best Smartwatch with Alexa Built-in

Are you thinking of buying the Best Smartwatch with Alexa Built in? Then the video will let you know what is the Best Smartwatch with Alexa Built in on the market right now.

5 – Amazfit GTS 3
4 – Amazfit Bip U Pro
3 – Amazfit GTS 2 Mini
2 – Fitbit Versa 2
1 – Fitbit Versa 3

In these video reviews, we are going to present you with the Best Smartwatch with Alexa Built in available in the shop today. Our expert teams have done rigorous research on existing products. Plus, spending hundreds of hours on the market and eventually brought these top-notch 5 Best Smartwatch with Alexa Built in.

Initially, they have worked with tons of traditional Best Smartwatch with Alexa Built in. However, finally, they narrow down the list with the five top-notch products by considering the design, features, usability, and overall performance.

To provide you the Best Smartwatch with Alexa Built in , our team never forgets to check the record of the manufactures. That’s how we have chosen the Best Smartwatch with Alexa Built in that you can rely on. Let’s dive into the video reviews to get your best desire products.

Disclaimer: Portions of footage found in this video is not the original content produced by Reviews Expert.
Portions of stock footage of products were gathered from multiple sources including, manufacturers, fellow creators, and various other sources.
If something belongs to you, and you want it to be removed, please do not hesitate to contact us at printingparkhq@gmail.com

#Best_Smartwatch_with_Alexa_Built_in

Background Music Credit
––––––––––––––––––––––––––––––
Sunset With You by Roa https://soundcloud.com/roa_music1031
Creative Commons — Attribution 3.0 Unported — CC BY 3.0
Free Download / Stream: https://bit.ly/3y2GJ59

This simple way of making cheesecakes will make you want to open your bakery store!

The best thing about making a mouthwatering cheesecake is the fact that it ain’t no rocket science, and Brad wants everyone to know that.

Watch as Brad walks viewers through an unbelievably easy way to make a cheesecake.

“The key for cheesecakes is to go low and slow in the oven,” he told WooGlobe. “Also, make sure your ingredients are room temp, they will incorporate easier. Once it’s done baking, turn the oven off and let it sit in there with the door closed until cool, about one hour. You can crack the door but you risk cracking your cheesecake!”

Goes to show that there’s always a more creative (and easy) way of doing most things!
Location: Chesapeake, United States

WooGlobe Ref : WGA417218
For licensing and to use this video, please email licensing@wooglobe.com

Chapter Three: Tackling Complicated Drupal 7 Migrations

As of April 5, Drupal 7 will have nine months before it’s entirely unsupported and becomes a liability. Migrating out of Drupal 7 can be complicated, and this is one reason many organizations have put it off for so long. While it’s true that Drupal 8 and beyond represent a radical change from Drupal 7, in everything from architecture (the introduction of Symfony components) to theming (Twig versus PHP), the path from Drupal 7 to now Drupal 10 is well trodden, and we’re very familiar with it at Chapter Three.

Because Drupal 7 has been around for well over a decade, many websites built on it have accumulated vast amounts of content, resulting in complex data structures with custom content types, fields, taxonomies, and entity relationships. Inconsistencies or irregularities in legacy data complicate the migration process.

Parabola GNU/Linux-libre: [arch-announce] The xz package has been backdoored

From: “Arch Linux: Recent news updates: David Runge” arch-announce@lists.archlinux.org

TL;DR: Upgrade your systems and container images now!

As many of you may have already read 1, the upstream release tarballs for xz in version 5.6.0 and 5.6.1 contain malicious code which adds a backdoor.

This vulnerability is tracked in the Arch Linux security tracker 2.

The xz packages prior to version 5.6.1-2 (specifically 5.6.0-1 and 5.6.1-1) contain this backdoor.

We strongly advise against using affected release artifacts and instead downloading what is currently available as latest version!

Upgrading the system

It is strongly advised to do a full system upgrade right away if your system currently has xz version 5.6.0-1 or 5.6.1-1 installed:

pacman -Syu

Regarding sshd authentication bypass/code execution

From the upstream report 1:

> openssh does not directly use liblzma. However debian and several other
distributions patch openssh to support systemd notification, and libsystemd
does depend on lzma.

Arch does not directly link openssh to liblzma, and thus this attack vector is not possible. You can confirm this by issuing the following command:

ldd "$(command -v sshd)"

However, out of an abundance of caution, we advise users to remove the malicious code from their system by upgrading either way. This is because other yet-to-be discovered methods to exploit the backdoor could exist.

URL: https://archlinux.org/news/the-xz-package-has-been-backdoored/

Backdoor in upstream xz/liblzma leading to SSH server compromise

After observing a few odd symptoms around liblzma (part of the xz package) on Debian sid installations over the last weeks (logins with ssh taking a lot of CPU, valgrind errors) I figured out the answer: The upstream xz repository and the xz tarballs have been backdoored. At first I thought this was a compromise of debian’s package, but it turns out to be upstream. ↫ Andres Freund I don’t normally report on security issues, but this is a big one not just because of the severity of the issue itself, but also because of its origins: it was created by and added to upstream xz/liblzma by a regular contributor of said project, and makes it possibly to bypass SSH encryption. It was discovered more or less by accident by Andres Freund. I have not yet analyzed precisely what is being checked for in the injected code, to allow unauthorized access. Since this is running in a pre-authentication context, it seems likely to allow some form of access or other form of remote code execution. ↫ Andres Freund The exploit was only added to the release tarballs, and not present when taking the code off GitHub manually. Luckily for all of us, the exploit has only made it way to the most bloodiest of bleeding edge distributions, such as Fedora Rawhide 41 and Debian testing, unstable and experimental, and as such has not been widely spread just yet. Nobody seems to know quite yet what the ultimate intent of the exploit seems to be. Of note: the person who added the compromising code was recently added as a Linux kernel maintainer.