Amazon crowdsources some work for humans that computers just cannot complete. Tasks often pay only a few cents to a few dollars each. If you have some time to spend and want to do what is usually pretty simple work such as completing identifying information in photos, to more complex tasks such as translations. You can always set up an account and complete a few HITS to get a feel for it. I’d done this many years ago when it was relatively new and was able to earn a few dollars, some people claim to easily make $50/day.
This addresses a common OWASP Top-Ten item – A9:2017-Using Components with Known Vulnerabilities.
For Non-Developers… in English, while software developers are creating websites they often use open-source libraries such as jQuery (or literally thousands of other libraries) to simplify their development. Eventually, almost all software is identified as being vulnerable to various attacks. This tool makes it easier to scan and report on libraries that might be used in an application so that they can be updated or replaced.
Originally designed for use in demonstrations on Linux bash in an easy to understand way that could be used in screenshots and demos. In my experience I’ve found that it also makes it easier to review details of remotely administered and virtual machines or images when performing maintenance.
Neofetch shows Operating System, uptime, CPU, GPU, and memory information. While built for linux bash, it can also be installed on macOS and Windows machines.
Installation for Linux is as simple as:
sudo apt install neofetch
Unless you’ve been completely removed from society over the past 10 years or so, you’ve likely heard about Bitcoin and other crypto currencies. While the technology behind them may beyond most peoples understanding and buying a single Bitcoin is likely too expensive for many people (as of today its over $56,000 USD = 1 BTC), you can still get in on the craze by mining. At the core of crypto currency is some really complicated math, mining is the process of having a computer perform some of those calculations. Usually this is done with entire farms of computers with high-end CPUs or GPUs. Regardless of your hardware you can still get in on the action by joining services that combine the actions of many users into smaller units of work.
While there are many providers out there, I’ve found that the client offered by CudoMiner is one of the easiest for most users to install and run on modest hardware running Windows, Linux or OS/X. After setup, you just have to leave your device powered and connected to the web to use the idle time to earn some money.
With the increase in remote workers and students over the past year, I’d expect that at least a few of those organizations have figured out that they can use the idle time on those devices for mining to increase their revenue stream.
Another Microsoft browser bites the dust. Legacy Edge, the original “Edge” on that was designed to replace MSIE on Windows 10 before Microsoft changed direction and used the same underlying engine already used by Chromium, Chrome and Safari is finally going away. During it’s short tenure and overlap with Chromium Edge, it’s lead to a lot of confusion by users that are not aware of the vastly different versions of ‘Edge’. Fortunately its support ended on March 9th, 2021 and it will be removed by Windows Update with the upcoming patch expected on April 13th 2021.
A very long time ago there was an online means to identify yourself online with a short abstracted code that resembled a PGP email signature, at that time I identified as:
-----BEGIN GEEK CODE BLOCK-----
GCS/IT d-(++@) s+:+ a- c++ UL++(++++$) P+++$ L+ E W+++$
N++ o++++ K w+++ O M V PS+ PE++ Y++ PGP+++ t+ 5 X++ R(-)
tv+ b+ DI+++ D+ G++ e++ h(-) r>++ y++*
-----END GEEK CODE BLOCK-----