I was going to post tonight's inquiry to the local tech support thread but noticed we don't seem to have one yet. I figured I may as well create one, (mods - feel free to relocate it as you see fit), and I'll pose my current challenge for some community input.
I came up with an intriguing project with which to occupy myself of late, and as I'm suffering serious dark thoughts it would be good for me to set myself to a task which will engage my overactive mind. I'm just not entirely sure how to approach it safely, as I'll describe below.
First are foremost, I am a Linux user and try to abstain from most locally-operated closed-source software applications where possible. So this will be a strictly open-source inquiry. (The exception for this exercise is that I'm using Chrome rather than Chromium - but I may migrate to the open-source alternative shortly.)
So about a decade ago, I created a network of browser shortcuts into an organized folder structure for all of my favorite websites. This was in the era before social media sites like Facebook replaced 90% of non-bot-oriented web traffic.
Examples of folder labels include:
- Listen (organizing field recording and generative synthesis ambient libraries)
- Converse (for forums like Steve Hoffman's audiophile community)
- Discover (for news feeds and deep-dive informational resources like web-hosted encyclopedias and ubuweb)
- Consume (with nested subfolders for used books, original pressing vinyl, etc)
- Ambient Music (a library of tutorial links for getting started with open-source music creation tools)
- Intellectual Amusement (for Google Scholar, TVTropes, and other cultural studies libraries)
- B-Movies (for MST3K-related fan-constructed content like annotated episode transcripts)
- Underworld (for every major official and unofficial resource for material relating to my favorite electronic duo)
- and Music Blogs (a massive folder of hundreds of ambient and experimental independent music news sources)
Now to the problem at hand. Tragically, the majority of the sites archived in my bookmarks have long-since shut down in the years since I painstakingly crafted and organized the links. I'm thinking of performing an audit - visiting each URL, and creating an updated bookmark system for the surviving sites.
But I am wary about malicious URL redirects from persons who purchased the abandoned or expired domains and replaced them with phishing links or similar malware.
I have an idea of the safest way to approach this errand. I have a secure sandboxed browser I use for cookie-less surfing which I usually use when I want to check Amazon for a product without being inundated with sponsored ads for the item for weeks on end. It's a Firefox default installation without any custom user configurations other than disabled history and cookies to aid in rendering it anonymous, which I use in tandem with a VPN to protect my local IP. But to avoid browser fingerprinting, I haven't customized or installed any pop-up blockers or similar browser add-ons.
Would that browser paired with a VPN be sufficient to test all those URLs? Or would you recommend that I go a step further and boot to a USB-bootable Live OS session, then securely transfer an export of the bookmarks to the default browser of the Live OS and export my revised tailored bookmarks to an HTML file?
I just want to make sure that I do this safely.
I'd love the community's thoughts! Thanks!
I found an answer myself.
https://www.cnet.com/tech/computing/how-to-check-if-a-web-site-is-safe/ (https://www.cnet.com/tech/computing/how-to-check-if-a-web-site-is-safe/) reports that I can use a URL checker such as Google's. Just enter:
http://google.com/safebrowsing/diagnostic?site= followed by the site you want to check
I'll try that this weekend.
Sounds good, ISB 🙂 let us know if you discover anything potentially malicious.
10 years ago or so, I would bring a bootable Linux distro with me on vacations so I'd dare log into services from other unknown computer if need be. You've already suggested using a USB, so I'd just second that option if the Google checker wasn't usable.
For myself, I wouldn't actually worry much and would just check them in my usual browser.
Thanks. I had a few minutes to kill tonight so I plowed through several hundred of the blogs and got the entire project done in one shot. Most of the blogs hadn't been updated since around 2010, and about 40% of them opted not to renew their domain licenses when they expired.
Nothing particularly malicious was found, though there were some suspicious CAPTCHAs on sites that had clearly closed down. I was able to get through them all just by using an incognito browser with relative safety.
I prefixed all of the dead links with an "X." I didn't have the heart to delete the shortcuts and figured by my archival nature there is some value to preserving the links in case I ever feel like plugging the URLs into The Internet Archive to revisit the deleted content. The Web is vastly different now than it was in those halcyon days of the wild west.
Thanks everyone. Maybe we can keep this thread alive for other tech-related inquires.
You found the solution. I was going to jump in with a few suggestions.
I was also going to add or suggest trying to use the wayback machine but I don't know if that would have been particularly helpful for what you were trying to achieve.
Thanks,
@DJChameleon! Yes - The Wayback Machine is precisely what I was referring to when I mentioned using The Internet Archive to revisit deleted content. It's a wonderful service! :)
QuoteMicrosoft 365
Nov 19, 2024
Discover how Windows 365 Link enables end users to work in a familiar Windows desktop with responsive, high-fidelity experiences. With no corporate apps or data on the device, a locked down OS, and passwordless authentication using Microsoft Entra ID, Windows 365 Link is secure by design. Efficiently manage Windows 365 Link alongside other PCs using Microsoft Intune to make the most of your productive time.
QuoteMicrosoft Mechanics
Nov 19, 2024
QuoteWindows 365 Link is the first Cloud PC device purpose-built for Windows 365. It can connect to your Cloud PC in seconds with a simple sign-in, accessing a familiar Windows Desktop with high-fidelity performance. Windows 365 Link offers seamless setup and streamlined management through Microsoft Intune, ensuring your IT environment is efficiently maintained alongside other PCs. As a stateless and adminless device, it does not store user profile data or install additional software.
Optimize your work experience with passwordless authentication, high-performance video conferencing, and support for essential peripherals. Designed with a robust security posture, Windows 365 Link provides data protection with features like Secure Boot, BitLocker encryption, Hypervisor-based Code Integrity, and more.
Jalleen Ringer, Partner GPM for Windows Cloud Endpoints, shows how Windows 365 Link is the ideal choice for secure, scalable, and efficient cloud computing.
Quote00:00 - Windows 365 Link—First Cloud PC device purpose-built for Windows 365
00:55 - What it's like to use Windows 365 Link
02:32 - Ports and connectivity
03:18 - Set it up
03:48 - Device management
05:26 - Wrap up
this looks interesting
@innerspaceboy do you also use windows? or just Linux?
I wondered if you have some dual boot situation maybe
@QuantumSync That device is indeed intriguing! Perhaps that's the next wave of computing on a global scale?
The closest I had to a device like that was a thinclient in 2015. The ambient noise of my PC's fan was interfering with my drone soundscapes in my office so I moved the tower to the basement and bought an HP T610 thinclient as an access point to the midtower.
But I understand that the device you shared is a whole different level of remote access.
I dual-booted for a few years but in 2015 made the decision to migrate exclusively to FOSS OS and software applications. It meant I had to retire from my 18-year career as a graphic designer, but it was worth it. I adore Linux.
I have a signed copy of
Free Software, Free Society and an array of other foundational texts of the movement.
To date I've compiled 127 books on Free and Open Culture and related subjects. The latest additions include the titles pictured, as well as
The Cyphernomicon and an archive of the Crypto-Anarchist mailing list from its run from 1992-1998. It's a thrilling and stimulating endeavor.
I may need to invest in a dedicated bookshelf specifically for the project. Their digital counterparts are organized into a network of spreadsheets, folder systems, and a notebook of rich-formatted documents linking directly to all content cited in the Archive. My organizational strategies have proven useful to aid me in navigating the material.
I'll keep working.
(https://i.imgur.com/kGmy2C9l.jpg)
(https://i.imgur.com/MeRzzaJl.jpg)
Nice setup! :)
Yes I took that shot of my FOSS books. I'd love to get all 127 of the ones I have digitally in physical formats but many were never published commercially.
I just recently acquired all 62 of Carl Jung's books for a Jungian coffee social group led by two retired psychology professors. I'm having fun going through those books as well.
I may be building a second midtower in the months ahead for a video installation project I've written about on this forum recently. It could be done with a Pi but I'm not savvy with microPC technology so I'll stick to what I know. If the vision is realized I'll surely share it here!
https://x.com/KevDeam/status/1859001401550213564
It just occurred to me - if Microsoft moves in this direction completely for all of its userbase, wouldn't it be the death knell of digital privacy? Even with a VPN, you'd be tunneling all your activity through Microsoft.
Do I understand that correctly?
Quote from: innerspaceboy on Nov 21, 2024, 01:54 PMIt just occurred to me - if Microsoft moves in this direction completely for all of its userbase, wouldn't it be the death knell of digital privacy? Even with a VPN, you'd be tunneling all your activity through Microsoft.
Do I understand that correctly?
not really sure
QuoteJeff Geerling
Nov 27, 2024
Contents:
00:00 - CM5 is here
00:38 - What's new?
02:12 - How much does it cost?
02:33 - CM5 IO Board
03:41 - CM5 Hardware
05:01 - Thermals and Upgrades
05:42 - Performance
07:08 - The elephant in the room
08:16 - CM5 projects
08:35 - 5 and 10 Gbps Networking
09:26 - SATA storage server
10:02 - PTP Time Server
10:28 - CM5 Carriers - improving on the Pi 5
11:07 - CM Stick carriers
11:37 - AMD GPU support and 4K gaming
12:13 - Commercial display (an instant 4K upgrade)
12:52 - Compute Blade
13:25 - Extreme PCIe on Mini ITX
13:52 - The first CM5 Pi Cluster!
15:13 - A better value than the CM4
QuoteTIMESTAMPS:
0:00 What is NotebookLM?
0:40 Getting Started
1:56 Tip 12
2:41 Tip 11 (making a podcast)
3:50 Tip 10
5:29 Tip 9
6:48 Tip 8
7:25 Tip 7 (make a study guide)
8:30 Tip 6 (make a timeline)
9:20 Tip 5 (make a briefing doc)
9:58 Tip 4
10:29 Tip 3
11:00 Tip 2
11:11 WOAH! UPDATES FROM GOOGLE!!
11:53 Tip 1 (using NotebookLM to read journal entries)
12:38 A word of caution
(https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.imgur.com%2F9YxpAVC.gif&f=1&nofb=1&ipt=e48adf9758e8692feae1fcf1e404b698890414abc65e60a3574d360971bd1c39&ipo=images)