Vista Normal

Hay nuevos artículos disponibles. Pincha para refrescar la página.
Ayer — 27 Noviembre 2024IT And Programming

Life Found On Ryugu Asteroid Sample, But It Looks Very Familiar

27 Noviembre 2024 at 12:00

Samples taken from the space-returned piece of asteroid Ryugu were collected and prepared under strict anti-contamination controls. Inside the cleanest of clean rooms, a tiny particle was collected from the returned sample with sterilized tools in a nitrogen atmosphere and stored in airtight containers before being embedded in an epoxy block for scanning electron microscopy.

It’s hard to imagine what more one could do, but despite all the precautions taken, the samples were rapidly colonized by terrestrial microorganisms. Only the upper few microns of the sample surface, but it happened. That’s what the images above show.

The surface of Ryugu from Rover 1B’s camera. Source: JAXA

Obtaining a sample from asteroid Ryugu was a triumph. Could this organic matter have come from the asteroid itself? In a word, no. Researchers have concluded the microorganisms are almost certainly terrestrial bacteria that contaminated the sample during collection, despite the precautions taken.

You can read the study to get all the details, but it seems that microorganisms — our world’s greatest colonizers — can circumvent contamination controls. No surprise, in a way. Every corner of our world is absolutely awash in microbial life. Opening samples on Earth comes with challenges.

As for off-Earth, robots may be doing the exploration but despite NASA assembling landers in clean room environments we may have already inadvertently exported terrestrial microbes to the Moon, and Mars. The search for life to which we are not related is one of science and humanity’s greatest quests, but it seems life found on a space-returned samples will end up looking awfully familiar until we step up our game.

Getting Started In Laser Cutting

Por: Jenny List
27 Noviembre 2024 at 09:00

If you were to walk into most of the world’s hackerspaces, it’s likely that the most frequent big-ticket tool you’ll find after a 3D printer is a laser cutter. A few years ago that would inevitably been one of the ubiquitous blue Chinese-made K40 machines, but here in 2024 it’s become common to see something far more sophisticated. For all that, many of us are still laser cutter noobs, and for us [Dominic Morrow] gave a talk at last summer’s EMF Camp in the UK entitled “Getting Started In Laser Cutting“. [Dominic] is a long-term laser cutting specialist who now works for Lightburn, so he’s ideally placed to deliver this subject.

It’s fair to say that this is an overview in the time available for a hacker camp talk rather than an in-depth piece, so he takes the approach of addressing people’s misconceptions and concerns about cutters. Perhaps the most important one he addresses is the exhaust, something we’ve seen a few in our community neglect in favor of excessive attention to laser cooling or other factors. An interesting one for us though was his talking about the cheaper diode lasers, having some insight into this end of the market is valuable when you have no idea which way to go.

We’re sorry to have missed this one in the real world, perhaps because of the allure of junk.

Massive Mural from Thermal Receipt Paper

27 Noviembre 2024 at 06:00
Receipt paper mural from above eye level

Turning trash into art is something we undoubtedly all admire. [Davis DeWitt] did just that with a massive mural made entirely from discarded receipt paper. [Davis] got lucky while doing some light dumpster diving, where he stumbled upon the box of thermal paper rolls. He saw the potential them and, armed with engineering skills and a rental-friendly approach, set out to create something original.

The journey began with a simple test: how long can a receipt be printed, continuously? With a maximum length of 10.5 feet per print, [Davis] designed an image for the mural using vector files to maintain a high resolution. The scale of the project was a challenge in itself, taking over 13 hours to render a single image at the necessary resolution for a mural of this size. The final piece is 30 foot (9.144 meters) wide and 11 foot (3.3528 meters) tall – a pretty conversational piece in anyone’s room – or shop, in [Davis]’ case.

Once the design was ready, the image was sliced into strips that matched the width of the receipt paper. Printing over 1,000 feet of paper wasn’t without its issues, so [Davis] designed a custom spool system to undo the curling of the receipts. Hanging the mural involved 3D-printed brackets and binder clips, allowing the strips to hang freely with a kinetic effect.

Though the thermal paper will fade over time, the beauty of this project lies in its adaptability—just reprint any faded strips. Want to see how it all came together? Watch the full process here.

Your Undocumented Project May Also Baffle People Someday

27 Noviembre 2024 at 03:00

What’s life without a little mystery? There’s one less rolling around after historians finally identified a donated mystery machine that had been in storage for years.

Feeding dough through this machine may have been faster, but probably not safer.

The main pieces of the machine are about a century old and any staff who may have known more about the undocumented device were no longer around to ask. The historical society finally posted pictures and asked for any insights, which eventually led to solving the mystery.

The machine is in all likelihood a beaten biscuit maker, which was a type of dense baked good popular in the American south. Making them called for a long and labor-intensive process of pounding and working the dough, and the society says this machine was likely created by a fellow trying to help his aunt streamline her business, offloading the labor of working the dough to a machine.

The machine had no branding of any sort and lacked any identifying marks. Its purpose was doubtfully obvious at the time, but no records remained and quite possibly none existed in the first place. Sound familiar? Perhaps someday our own undocumented projects and prototypes will mystify people. It’s certainly happened in the case of mysterious Roman dodecahedrons, which remain a head-scratching mystery.

A Robot Meant for Humans

27 Noviembre 2024 at 00:00

Although humanity was hoping for a more optimistic robotic future in the post-war era, with media reflecting that sentiment like The Jetsons or Lost in Space, we seem to have shifted our collective consciousness (for good reasons) to a more Black Mirror/Terminator future as real-world companies like Boston Dynamics are actually building these styles of machines instead of helpful Rosies. But this future isn’t guaranteed, and a PhD researcher is hoping to claim back a more hopeful outlook with a robot called Blossom which is specifically built to investigate how humans interact with robots.

For a platform this robot is not too complex, consisting of an accessible frame that can be laser-cut from wood with only a few moving parts controlled by servos. The robot is not too large, either, and can be set on a desk to be used as a telepresence robot. But Blossom’s creator [Michael] wanted this to help understand how humans interact with robots so the latest version is outfitted not only with a large language model with text-to-speech capabilities, but also with a compelling backstory, lore, and a voice derived from Animal Crossing that’s neither human nor recognizable synthetic robot, all in an effort to make the device more approachable.

To that end, [Michael] set the robot up at a Maker Faire to see what sorts of interactions Blossom would have with passers by, and while most were interested in the web-based control system for the robot a few others came by and had conversations with it. It’s certainly an interesting project and reminds us a bit of this other piece of research from MIT that looked at how humans and robots can work productively alongside one another.

A Laser with Mirrors makes a CRT-like Display

Por: Maya Posch
26 Noviembre 2024 at 21:00

[bitluni]’s laser-based display pretending to be a an old-school vector CRT.
Phosphor-based displays like CRTs rely on the phosphor to emit light for a set amount of time after being activated, allowing them to display a seemingly persistent image with one drawing beam per color. Translated to UV-sensitive PLA filament, this means that you can totally use a printed sheet of this material in combination with a 405 nm laser diode to create a display that doesn’t look dissimilar to an early CRT. This is exactly what [bitluni] did in a recent video, meshing together said laser diode, UV-sensitive PLA, stepper motors and two mirrors with an Arduino-based controller to create a rather interesting vector display.

In the video, [bitluni] goes over the development steps, including a range of improvements like being able to turn off the laser when moving between the end of a line and the beginning of a new one. While the Arduino Nano board does the driving of the stepper motor controllers, an ESP32 provides the drawing instructions. The STL and other project files including Nano & ESP32 firmware can be found on the GitHub project page.

While far from being a practical display with a single-digit Hz refresh rate, it does provide an interesting demonstration of these types of persistence of vision based displays, and without the use of exotic MEMS mirror modules or the like.

XPipe - A connection hub for all your servers: Status update for the v13 release

XPipe - A connection hub for all your servers: Status update for the v13 release

I'm proud to share a major development status update of XPipe, a new connection hub that allows you to access your entire server infrastructure from your local desktop. It works on top of your installed command-line programs and does not require any setup on your remote systems. XPipe integrates with your tools such as your favourite text/code editors, terminals, shells, command-line tools and more.

Here is how it looks like if you haven't seen it before:

https://preview.redd.it/leg7b1xycf3e1.png?width=1360&format=png&auto=webp&s=9ed5bf993acc9ffb1fb199a2fd728fef138297d0

https://preview.redd.it/rrrcl700df3e1.png?width=1360&format=png&auto=webp&s=b2cbab0fc2b62f3bc03675a59bc789a6a30aeaab

VMs

  • There is now support for KVM/QEMU virtual machines that can be accessed via the libvirt CLI tools virsh. This includes support for other driver URLs as well aside from KVM and QEMU
  • You can now override a VM IP if you're using an advanced networking setup where the default IP detection is not suitable. For example, if you are using a firewall like opnsense on your hypervisor
  • Fix remote VM SSH connections not being able to use the keys and identities from the local system
  • There is now a new restart button for containers and VMs

File browser

  • There is now a new option in the context menu of a tab to pin it, allowing for having a split view with two different file systems
  • There is now the option to dock terminals in the file browser (this is only available on Windows for now). You can disable this in the settings if you don't like it
  • The previous system history tab is now always shown
  • You can now change the default download location for the move to downloads button

https://preview.redd.it/6mj7mun2df3e1.png?width=1920&format=png&auto=webp&s=f362da6adfdcd860be30d3521131542d5367d37f

https://preview.redd.it/d57k9vl5df3e1.png?width=1920&format=png&auto=webp&s=7f8cf1171bbb8432b883323fff369b0dad66da48

Other

  • The application style has been reworked
  • Improve license requirement handling for systems. You can now add all systems without a license and also search for available subconnections. Only establishing the actual connection in a terminal or in the file browser will show any license requirement notice. This allows you to check whether all systems and installed tools are correctly recognized before considering purchasing a license.
  • Rework Windows msi installer to support both per-user and system-wide installations. The installer will also now respect the properties ALLUSERS. This makes it possible to install XPipe with tools such as intune
  • Add download context menu action in file browser as an alternative to dragging files to the download box
  • Fix proxmox detection not working when not using the PVE distro and not logging in as root
  • The settings menu now shows a restart button when a setting has been changed that requires a restart to apply
  • There is now an intro to scripts to provide some more information before using scripts
  • Add ability to enable agent forwarding when using the SSH-Agent for identities
  • Closing a terminal tab/window while the session is loading will now cancel the loading process in XPipe as well
  • A newly opened terminal will now regain focus after any password prompt was entered in xpipe
  • Add warning message when the incompatible coreutils homebrew package is in the PATH on macOS
  • The .rpm releases are now signed

Shell sessions

Many improvements have been implemented for the reusability of shell sessions running in the background. Whenever you access a system or a parent system, XPipe will connect to it just as before but keep this session open in the background for some time. It does so under the assumption that you will typically perform multiple actions shortly afterward. This will improve the speed of many actions and also results in less authentication prompts when you are using something like 2FA.

Security updates

There's now a new mechanism in place for checking for security updates separately from the normal update check. This is important going forward, to be able to act quickly when any security patch is published. The goal is that all users have the possibility to get notified even if they don't follow announcements on the GitHub repo or on Discord. You can also disable this functionality in the settings if you want.

Fixes

  • Fix Proxmox detection not working when not logging in as root
  • Fix tunnels not closing properly when having to be closed forcefully
  • Fix vmware integration failing when files other than .vmx were in the VM directories
  • Fix Tabby not launching properly on Windows
  • Fix SSH and docker issues with home assistant systems
  • Fix git readme not showing connections in nested children categories
  • Fix Windows Terminal Preview and Canary not being recognized

A note on the open-source model

Since it has come up a few times, in addition to the note in the git repository, I would like to clarify that XPipe is not fully FOSS software. The core that you can find on GitHub is Apache 2.0 licensed, but the distribution you download ships with closed-source extensions. There's also a licensing system in place as I am trying to make a living out of this. I understand that this is a deal-breaker for some, so I wanted to give a heads-up.

Outlook

If this project sounds interesting to you, you can check it out on GitHub or visit the Website for more information.

Enjoy!

submitted by /u/milchshakee
[link] [comments]

Is there a self-hostable WAF that does not require a license?

I'm looking for something that will inspect user input for signs of XSS, SQL Injection, etc. before it allows the request to be forwarded to the web application. Even better if I can configure it with what each endpoint is expecting an input to look like.

open-appsec looks interesting but I don't want to register for a license, even if it's free. Crowded appears to be just a crowdsourced list of bad IPs.

What else is out there as an actual WAF that I can simply add as an ingress proxy to my docker containers?

submitted by /u/sunshine-and-sorrow
[link] [comments]

Why are linuxsever.io images missing SEMVER tags

First of all, sorry for this post being a bit of a rant but I'm looking forward to your answers.

A lot of the docker images I use are using SEMVER for their versioning. For example the official Nextcloud image provides the tag 30-apache. I will get all minor and patch updates from Nextcloud by pinning my image to 30-apache but not the major update to 31-apache which could contain breaking changes.

However linuxserver.io images don't provide SEMVER tags. They highlighted why in Docker Tags: So Many Tags, So Little Time - SemVer Info but I don't really get their reason.

They say that an upstream project could release a minor change that coincides with structural changes in the image from linuxserver.io that could introduce breaking changes. This could give the user a false sense of security. However how is this better in the current state where the only tag one could reasonably use for linuxserver.io images is latest?

When they release structural changes that introduce breaking changes and I'm on latest I'm still affected by this breaking change. I don't even get why they would release such huge structural changes that could introduce breaking changes. They say they publish a docker image that has various components added to the upstream project's release. This just introduces more stuff that could break when updating the image. The official images just include stuff in the image that is needed for it to run and that's it. When a breaking change is required the image a breaking change can be released for the whole software.

If I understand this correctly, the only supported way to use the linuxserver.io images is to pint to a specific version like 30.0.2 but then I won't get any updates by pulling.
Each day I'd have to spend a lot of time updating those tags for a lot of different containers. This would be a lot of effort, even with ansible and an n8n task that notifies me for updates as, for linuxserver.io images, there is always the change of breaking changes because of structural changes introduced by them.

I would just avoid the linuxserver.io images if I could but some services don't have an official image.
For me this includes the complete *arr suite and speedtest-tracker.

Maybe some of you can give me some perspective on how this decision makes sense or tell me how you make updating the linuxserver.io images easier if you are using them.

Edit: Link formatting

submitted by /u/Quadrubo
[link] [comments]

Anyone self-hosting shadowsocks?

Do you have experience with hosting shadowsocks with tweaks to prevent government-sponsored entitities to disrupt the connections?

The publicly available sources appear a bit outdated by now, e.g.: - How China Detects and Blocks Shadowsocks - Tell HN: The Internet situation inside Iran

Feel free to also direct message me. Thank you kindly!

submitted by /u/esiy0676
[link] [comments]

PdfDing Update

HI r/selfhosted,

It has been some time since have introduced PdfDing to this community. PdfDing is a selfhosted PDF manager and viewer offering a seamless user experience on multiple devices.

Since then I have added some new features that I want to share with you:

  • Share PDFs with an external audience via a link or a QR Code
  • Shared PDFs can be password protected and access can be controlled with a maximum number of views and an expiration date
  • Dark Mode, colored themes and custom theme colors
  • Inverted color mode for reading PDFs
  • PDF bulk upload
  • Automated and encrypted backups to S3 compatible storage

The repository can now be found on GitHub: https://github.com/mrmn2/PdfDing. I would really appreciate it if you would star the repo!

submitted by /u/wlu18541
[link] [comments]

are there any good ebook projects still active?

im looking to get a stack for ebooks to organize and and get ebooks from? my mom has a kindle and reads a ton so figured it would be cool to get something going for her.

ive messed with some stuff in the past but they werent still being used and such so figured to see if theres anything new going on that i could use.

submitted by /u/carminehk
[link] [comments]

Help me decide i5-12400 or i5-13500 as an upgrade?

Hey self hosters, i currently running unraid on an old pc with i5-8400, h310 mobo, 16gb ram, with 3 refurbished iron wolf pro 4tb.

I run the usual arr apps and plex, but mostly stream to only 1~2 device max, also an immich server for photo backup, and frigate for surveillance footage recording.

Most of the time the cpu usage are less than ~10%, there's some >90% system memory alert from netdata from time to time, mainly cause by frigate schedule stuff, but that's it.

Now why I am thinking about upgrade because I have plenty of free times to explore more apps to be self hosted, especially I'm planning to degoogle as much as possible with self hosted apps.

Another thing is I may want to host some game server like Minecraft from time to time, I usually rotate between game like Minecraft/ARK/Palworld and invite my friends to play with me, so it would be great if i can host it within a vm in unraid.

But ultimately I also like to "save cost", both on equipment and electricity, it's not really an issue with affordability, but it's a fun challenges to make something work with low cost, (that's probably why I'm also a min/max player in many game, trying to get the best cost value)

The first upgrade route: ($250) - i5-12400 (oem from aliexpress) ~ $100 - 32GB 16x2 DDR4 3200Mhz RAM (used) ~ $40 - MSI B660M Mortar with 6 Sata port ~ $110

The second upgrade route: ($370) - i5-13500 (oem) ~ $180 - 64GB DDR4 RAM ~ $80 - MSI B660M Mortar with 6 Sata port ~ $110

(I'm also concerned about the 13th/14th gen issue and potential harm on my hdd/ssd, but they reddit says 13500 is just refreshed 12th gen and no people report issues on this cpu, yet?)

Alternative motherboard option: - CWWK Q670 $153 (8 sata, dual nic +vpro, BUT ddr5 ram cost double, only 2 ram) - Some random china brand cloud star Z690 $110 (8 sata, 4x intel nic, ddr4, 4x m.2)

Main concern is these motherboard may have compatibility issue, less update, and I most likely won't be able to ship back.

some suggestions here would be appreciated!

submitted by /u/JosephCY
[link] [comments]

Best service to self host and manage VPN connection from friends?

I want to self host a VPN service to allow my friends to access my JellyFin library. I first used wireguard, but you can't manage what IPs they can access without themselves being able to change it back. I trust my friends, but not to the degree of possibly giving them access to my whole network.

I tried to use NetBird self host, but can't get it to work properly and i am confused with the dashboard and how to set the proper rules. Thinking about trying headscale, as i have heard much good about tailscale, but as said want it to be selfhosted.

Fore management and accessing all internal IPs i use Wireguard on my router.

If somebody has tipps for me when using headscale or another software (that is rather easy to setup as a peer for my friends) i am open for suggestions

submitted by /u/devilishTL
[link] [comments]
❌
❌