Language Selection

English French German Italian Portuguese Spanish

Mozilla Leftovers: Thunderbird, Firefox, Tor Browser, and More

Filed under
Software
Moz/FF
  • Thunderbird – Hotkeys Shortcuts Cheatsheet
  • Another Step in Automating the Pageload Recordings

    In a previous article, Kimberly Sereduck told us about Updates to Warm Page Load Tests and how we are continuously working to make our tests more representative of real user behavior. Besides that, we are working on automating the process of recording the website’s page load.

  • Practicing lean data is a journey that can start anywhere - Open Policy & Advocacy

    “It’s not about the destination, but about the journey.” I’m sure data and privacy are the furthest from your mind when you hear this popular saying. However, after a year of virtually sharing Mozilla’s Lean Data Practices (LDP), I’ve realized this quote perfectly describes privacy, LDP, and the process that stakeholders work through as they apply the principles to their projects, products, and policies.

    [...]

    There is an appetite to understand how we as consumers can hold companies accountable. One of the biggest surprises for me came when I would field questions at the end of a presentation, and people would ask about their rights as consumers and how they can hold companies accountable. For example, people wanted to understand their rights and recourse options if companies contacted them without permission, didn’t honor their unsubscribe requests, or did something else frustrating. I teach LDP for individuals to apply it in a business context, but we are all also consumers and customers. LDP can help us better understand how our own data should be handled and improve our understanding of what organizations are doing. We can then remember how we feel about certain situations and then ensure we are doing things in a more consumer-friendly way within our organizations.

    Lean Data Practices is a journey. For many there won’t be an ultimate destination because it is an iterative process. If you try to apply all the principles across your entire organization at once, you will find yourself overwhelmed and likely unsuccessful. To maximize your chance of success, my advice — which is the same advice we give when we present — is to just start somewhere. Choose one aspect of your business and focus on that, one pillar at a time. Once you’ve successfully applied the principles, go to a different business unit and do the same. Remember to review and adapt as products and business needs (or data!) change as well. You may likely never reach your destination, but you will see your company improve in its practices along the way.

  • Tor vs. VPN: Is One Better than the Other?

    Tor and VPN have unique ways to ensure user privacy on the Internet. They’re fundamentally very different yet have many similar aims. Due to the overlap in features, you may be weighing the pros and cons of using one over the other. Or maybe they can be treated equally but with separate purposes. This guide digs into everything you need to know about which software should be used for more Internet anonymity.

  • New Alpha Release: Tor Browser 11.5a2 (Windows, macOS, Linux)

    Tor Browser 11.5a2 is now available from the Tor Browser download page and also from our distribution directory.

    This version includes important security updates to Firefox.

More in Tux Machines

Programming Leftovers

  • Return String From Function C++

    A way to identify a series of strings as a class member is specified in C++’s definition. The String class holds attributes as a stream of bits, with the ability to handle a single-byte character. In C++, we may retrieve a string, but we should still examine how the string will be retained and transferred. Because C++ returns elements on the heap, which has a finite amount of space, providing immense components will induce stack overflow issues that could result in errors and security flaws. If we can return a std::string object from the standard template library, we may provide a constant pointer to the string. Ascertain that the string is retained in static memory. This article outlines various approaches for returning a string from a C++ function.

  • How to round of Numbers in Java

    Java provides a built-in class known as Math class which belongs to the java.lang package. The java.lang.Math class provides numerous methods that are used to perform different numeric operations such as rounding of a number, finding square root, and so on. The Math class offers multiple methods to round off a number such as round(), ceil(), floor().

  • Writing it down

    PWC 165 refers us to mathsisfun for the algorithm to be used. Let’s write it down.

Emulate the VIC-20 home computer with Linux

Emulation is the practice of using a program (called an emulator) on a PC to mimic the behaviour of a home computer or a video game console, in order to play (usually retro) games on a computer. Home computers were a class of microcomputers that entered the market in 1977 and became common during the 1980s. They were marketed to consumers as affordable and accessible computers that, for the first time, were intended for the use of a single non-technical user. Back in the 1980s, home computers came to the forefront of teenagers’ minds. Specifically, the Amiga, ZX Spectrum, and Atari ST were extremely popular. They were hugely popular home computers targeted heavily towards games, but they also ran other types of software. The Commodore VIC-20 is an 8-bit home computer that was released in 1980/1. It featured a MOS Technology 6502 CPU, with 20KB ROM and 5KB RAM although 1.5K of the RAM was used for the video display and aspects of the BASIC and kernal. It offered limited low-resolution graphics (176 x 184) with storage provided by cassette and floppy disk. Read more

PostgreSQL Anonymizer 1.0: Privacy By Design For Postgres

PostgreSQL Anonymizer is an extension that hides or replaces personally identifiable information (PII) or commercially sensitive data from a PostgreSQL database. The extension supports 3 different anonymization strategies: Dynamic Masking, Static Masking and Anonymous Dumps. It also offers a large choice of Masking Functions such as Substitution, Randomization, Faking, Pseudonymization, Partial Scrambling, Shuffling, Noise Addition and Generalization. Read more

today's howtos

  • Web UI Dashboard for Kubernetes
  • Dmesg Command in Linux – Options + Examples
  • How to set up your graphics card in Zorin OS - Real Linux User

    Most modern Linux distributions have out of the box outstanding support for most of the available hardware components, like your graphics card, printer and WiFi adapter. Even for many relatively new hardware technologies there is support with the help of Hardware Enablement. But it is always possible that the setup procedure doesn’t come up directly with the correct or most optimized drivers for your specific internal or external devices. In this article as part of my Zorin OS tutorial series I will focus on the support of graphics cards and will show you how to install or update graphics drivers in Zorin OS.

  • How to install Vivaldi browser on Fedora 36 - NextGenTips

    Vivaldi browser is a freeware, cross-platform web browser developed by Vivaldi Technologies. It has a minimalistic user interface with basic icons and fonts and, an optionally color scheme that changes based on the background and design of the web page being visited.