FreeOTP is a two-factor authentication application for systems utilizing one-time password protocols. Tokens can be added easily by scanning a QR code. If you need to generate a QR code, try our QR code generator.
FreeOTP implements open standards: HOTP and TOTP. This means that no proprietary server-side component is necessary: use any server-side component that implements these standards. We recommend FreeIPA.
it appears that ${name}_umask will do the job. i.e. in my case syncthing_umask="0002" set in /etc/rc.conf (or /usr/local/etc/rc.conf).
There are three types of file links supported in the NTFS file system: hard links, junctions, and symbolic links. Otherwise known as Reparse Points.
Hard Links can only be created for files. Any changes to that file are instantly visible to applications that access it through the hard links that reference it. Hard links do not support UNC paths (network paths that begin with \). Hard links to a file will not have a shortcut arrow icon on them.
Symbolic Links are soft links that are basically advanced shortcuts. You can create a symbolic link to a local or remote file, folder, or shares path, and that link will appear to be the same as the target source. Symbolic links do support UNC paths (network paths that begin with \). When you open a symbolic link, you will be redirected to the target source. Symbolic links will have a shortcut arrow icon on them.
Junctions (Directory Junction) are soft links that can only be created to a local folder (directory) path. Junction points make it appear as though folder (directory) actually exists at the location of the junction point, and your app won’t know any better. Junction points do not support UNC paths (network paths that begin with \). Junction points will have a shortcut arrow icon on them.
Deleting anything in the link/junction or target (source) folder will delete it in both folders.
Deleting the hard link, symbolic link, or junction point itself will not delete anything in the target (source) folder.
The science of acoustic fire suppression, which has long been known and documented in scientific literature and the press, works by vibrating oxygen molecules away from a fuel source, depriving the fire of a critical component needed for combustion.
Indeed, after just a few seconds of infrasound, the tiny kitchen blaze goes out. //
Sonic Fire Tech says that its system is as good as, if not better than, traditional sprinklers for many applications.
“Sonic Fire Tech is in fact intended to replace interior residential sprinklers,” Pollack told Ars. “The demo showed a critical benefit of SFT over water sprinklers in suppressing a kitchen fire, which represents about half of all residential fires. This is also applicable to commercial kitchen fires and other common grease and chemical fire applications.” //
“Sprinklers have a well-established role,” Nate Wittasek, a Los Angeles-based fire protection engineer, emailed Ars. “They apply water directly to the fuel, cool the space, slow or stop flashover, and give people time to get out while reducing risk to firefighters. Sound may knock down a small flame, but it does not cool hot surfaces or wet fuel. That raises real questions about re-ignition, smoldering fires, hidden fires, and fires that are partially blocked by contents.”
Water sprinklers have been around for a long time. The National Fire Protection Association (NFPA), a well-known industry nonprofit, was founded in the late 1800s to develop a uniform standard for sprinklers. The latest iteration of those guidelines, known as the “13D” standard, is well documented and widely adopted.
A recent press release from Sonic Fire Tech states that the company has “secured third-party validation of its system as a viable NFPA 13D-equivalent alternative to conventional residential sprinklers.” ////
Why not both? First and second level.
Transporting oil by pipelines is significantly safer for workers and carries lower risk of spills than moving it by train or truck, a new report from the Fraser Institute says. Analyzing data from Canada’s National Energy Board and the US Department of Transportation going back to the year 2000, the report’s authors find that pipelines result in fewer spillage incidents and personal injuries than road and rail in North America. //
The evidence is clear: transporting oil by pipeline is safe and environmentally friendly. Furthermore, pipeline transportation is safer than transportation by road, rail, or barge, as measured by incidents, injuries, and fatalities- even though more road and rail incidents go unreported. //
There are 825,000 kilometres of pipeline in Canada and about five times that much in the US. In the US from 2005 to 2009, there were more “serious” incidents, injuries and fatalities resulting from the shipment of oil by road and rail than by pipeline.
Accounting for the superior safety and environmental performance of pipelines is the “genius” of the technology, which has the shipping container remain static while the commodity moves. According to the report, there are an average of 20 spills per billion ton-miles in trucking, two in rail shipping, and 0.6 in pipelines. Pipeline spills release more oil, however, than either road or rail spills. The report maintains that despite the relatively higher quantities of oil released, it is still “miniscule” when taken in the context of the total quantities being shipped each day.
The ten-year average for the frequency of liquid leaks is “approximately three leaks per 1,000 km of pipeline” the report says, citing the Canadian Association of Petroleum Producers for that statistic.
Fatalities for pipeline workers averaged 0.2 per year from 2000 to 2009, it says. The rate of rail-related fatalities, by contrast, was 91 in 2010 and has a five-year average of 81. Measured by ton-miles, the rate of injuries associated with shipping by pipelines was just 0.00687 injuries requiring hospitalization per billion ton-miles; rail caused 30 times that many injuries.
Our list with linked lab reports for 67 toothpaste
& tooth powder products is below this chart (scroll down).
List below this chart last updated: February 21, 2026
On March 23, 2026, the Hong Kong government changed the implementing rules relating to the National Security Law. It is now a criminal offense to refuse to give the Hong Kong police the passwords or decryption assistance to access all personal electronic devices including cellphones and laptops. This legal change applies to everyone, including U.S. citizens, in Hong Kong, arriving or just transiting Hong Kong International Airport. In addition, the Hong Kong government also has more authority to take and keep any personal devices, as evidence, that they claim are linked to national security offenses.
A core part of the energy transition and of the solutions to meeting energy needs, nuclear energy is a strategic resource that is often a subject of debate. This section aims to respond to the main questions and misconceptions by presenting nuclear energy as clearly as possible. The goal is for everyone to form their own opinion.
The capacity of nuclear energy to ensure our energy independence and to guarantee the production of low-carbon electricity is invaluable for tackling the climate emergency.
- A Low-carbon energy – Yes, it emits the least greenhouse gases!
- Constant and controllable energy
- Competitive energy – Least expensive!!
- Energy that is essential to the electricity mix
- Energy that is vital for tomorrow’s world
- Energy that is sparing in its demand for raw materials – It saves natural resources!
- Energy that preserves health – It does NOT emit fine particles, nitrogen dioxide, sulfur dioxide, nitrates or phosphates into the atmosphere!
The plume escaping the reactors? Water vapor. That’s it.
Nuclear power is the most reliable and cleanest form of energy. //
Belgium has accepted reality and embraced nuclear power 20 years after passing phase-out legislation.
The Belgian government intends to acquire all of the “nuclear operations in the country” from the French energy group Engie.
“By doing so, the Belgian Government is taking responsibility for Belgium’s long-term energy future, with the objective of building a financially and economically viable activity that supports security of supply, climate objectives, industrial resilience and socio-economic prosperity,” Engie and the Belgian government said in a joint statement.
The vulnerability and exploit code that exploits it were released Wednesday evening by researchers from security firm Theori, five weeks after privately disclosing it to the Linux kernel security team. The team patched the vulnerability in versions 7.0, 6.19.12, 6.18.12, 6.12.85, 6.6.137, 6.1.170, 5.15.204, and 5.10.254) but few of the Linux distributions had incorporated those fixes at the time the exploit was released.
A single script hacks all distros
The critical flaw, tracked as CVE-2026-31431 and the name CopyFail, is a local privilege escalation, a vulnerability class that allows unprivileged users to elevate themselves to administrators. CopyFail is particularly severe because it can be exploited with a single piece of exploit code—released in Wednesday’s disclosure—that works across all vulnerable distributions with no modification. With that, an attacker can, among other things, hack multi-tenant systems, break out of containers based on Kubernetes or other frameworks, and create malicious pull requests that pipe the exploit code through CI/CD work flows.
“‘Local privilege escalation’ sounds dry, so let me unpack it,” researcher Jorijn Schrijvershof wrote Thursday. “It means: an attacker who already has some way to run code on the machine, even as the most boring unprivileged user, can promote themselves to root. From there they can read every file, install backdoors, watch every process, and pivot to other systems.”
Belgium is reversing its decades long phasing-out course, seeking more energy independence by reviving its nuclear plants.
The Belgian government signed on Thursday a Letter of Intent to acquire Electrabel's (ENGIE) entire nuclear operations in the country.
Such a move would reverse the phase-out of nuclear energy legislation adopted in the early 2000s amid safety concerns.
Belgian Prime Minister Bart De Wever stated that the country is aiming to reduce its reliance on fossil fuels and gain greater autonomy in managing its own energy supplies.
Scanner
Between 1939 and 1945, Allied planes dropped 3.4 million tons of bombs on Axis powers.
This document takes a look at MeshCentral Router, a Windows application that performs TCP and UDP port mapping from a local machine to any remote computer through a MeshCentral servers. This document should allow the user to Internet relay traffic through NAT routers and firewalls.
FreeBSD can play not only one but three firewalls. Networking is complicated by itself and firewalls can be complex too. So when they mix together your brain may collapse. Pick up one and then learn how the networks function and later how to manipulate the firewall. One of those three firewalls in FreeBSD is IPFW. The minimal configuration for IPFW is the one written on this article. Don’t think of this firewall as a dumb, too simple firewall solution. Mac OS X, for example, uses it and puts a nice interface in the System Settings so any noob can use it. Although nowadays it’s using another firewall PFCTL I guess it’s from the OpenBSD, it has had IPFW for many years as the default firewall. And quite frankly it has served many users pretty well.
We will edit the main os configuration file with nano.
As always under FreeBSD the /etc/rc.conf file is the one in charge to activate OS level features as well as some other important software. Type this command to set the firewall configuration into the right file:
sudo nano /etc/rc.conf
Now edit the rules so they look as follows.
firewall_enable="YES"
firewall_quiet="YES"
firewall_type="workstation"
firewall_myservices="22 80 443 10000"
firewall_allowservices="any"
firewall_logdeny="YES"
Now you must start up the service in order for the firewall to start working. Type the following order at the terminal prompt.
sudo service ipfw onestart
The numbers appearing in the line firewall_myservices=”22 80…” are the ports the firewall leaves open. The rest of the ports to your server or workstation will remain closed.
The opened ones are the basic to run a web server. Port number 22 is used for remote connections through SSH (secure shell). The number 80 is used by the HTTP protocol and since we are setting up a web server this is mandatory. Something similar happens with the port number 443 but this is the one for the https, which is the http protocol surrounded by an TLS encryption so no one can read the content in it.
Fail2ban is a complementary tool to your firewall. It works by scanning log files and bans IPs which present suspicious activity such as failed logins. It is compatible with many UNIX-like systems and is a security tool to have in your arsenal. It can filter not only ssh logins, but other services too, for example CMS web sites as WordPress or Drupal, repositories such as your own GitLab, and even your Postfix (or other) mail server.
Intrusion prevention framework that bans malicious IPs.
Overview
Fail2ban is an intrusion prevention system written in Python that protects Linux and Unix web servers from brute-force attacks by monitoring log files and banning IP addresses that show suspicious activity. Originally developed by Cyril Jaquier in 2004, fail2ban works by parsing log files through regular expressions, identifying patterns that indicate malicious behavior like repeated failed login attempts, and automatically creating firewall rules to block offending IP addresses for specified time periods.
If the modern Settings UI is broken (sometimes seen after feature updates), the classic Date and Time dialog still works.
- Press Win + R, type
timedate.cpland press Enter.
When the Settings UI is unavailable, Windows provides command‑line tools to set or inspect time zone entries.
Key commands:
- Check current time zone:
tzutil /g - List available time zones:
tzutil /l - Set a time zone:
tzutil /s "Time Zone Name"(the Windows time zone string, e.g., "Pacific Standard Time").
what does the service actually do?
Duck DNS is a free service which will point a DNS (sub domains of duckdns.org) to an IP of your choice