<<

BOOKS Full Circle REVIEWED THE INDEPENDENT MAGAZINE FOR THE COMMUNITY

ISSUE #1 04 - December 201 5

DDIIYY 33DD PPRRIINNTTEERR BUILDING A REPRAPPRO FISHER 1 full circle magazine #1 04 1 Full Ciircle Magaziine iis neiither affiiliiated wiith,, nor endorsed by,, Canoniical Ltd.. contents ^ HowTo Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY Python in REAL World p.1 1 Linux News p.04

LibreOffice p.1 5 Command & Conquer p.1 0 Arduino p.31 Chrome Cult p.32

Install Mint on Raid 0 p.1 8 Linux Labs p.35 Ubuntu Phones p.37 Book Review p.38

Using TOP p.23 Book Review p.40 Letters p.XX Tuxidermy p.XX

Ubuntu Games p.50 Inkscape p.26 Q&A p.43 Security p.46 Graphics

The articles contained in this magazine are released under the Creative Commons Attribution-Share Alike 3.0 Unported license. This means you can adapt, copy, distribute and transmit the articles but only under the following conditions: you must attribute the work to the original author in some way (at least a name, email or URL) and to this magazine by name ('Full Circle Magazine') and the URL www.fullcirclemagazine.org (but not attribute the article(s) in any way that suggests that they endorse you or your use of the work). If you alter, transform, or build upon this work, you must distribute the resulting work under the same, similar or a compatible license. Full Circle magazine is entirely independent of , the sponsor of the Ubuntu projects, and the views and opinions in the magazine should in no way be assumedftuoll hciarvceleCmaangoanziicnael #en1 d0o4rseme2nt. contents ^ EEDDIITTOORRIIAALL

This magazine was created using :

WELCOME TO ANOTHER ISSUE OF FULL CIRCLE.

t's a full house this month. Greg and Elmer bring you Python and LibreOffice and are I joined by a lengthy article on installing (or any *buntu for that matter) on a Raid 0 system, and a quick look at the Top command. As ever, Mark is here with Inkscape too.

Starting this month is a Linux Labs series on how I built my RepRapPro Fisher 1 3D printer. I took me a full weekend of double checking everything ('measure twice, cut once' as the old saying goes). Amazingly, it worked first time and is a great printer. I estimate the series to be in at least four parts. I'm not going in to every step of the build (as all the instructions are online) but touching on the main points of it, and the little things to look out Find Full Circle on: for. In tandem with that piece, my Arduino article is briefly discussing the Arduino compatible Duet board that controls the Fisher 3D printer. goo.gl/FRTMl

If privacy and security is what you need then this month's Security and Chrome Cult articles are a must. S.J. looks at encryption in the ChromeOS on a Chromebook, and the facebook.com/fullcircle Security piece shows you how to create an encrypted drive with VeraCrypt. magazine

Last, but not least, we have a couple of book reviews. Just in case you happen to have a .com/#!/fullcirclemag quiet moment over the holiday season. http://issuu.com/fullcircle All the best, and see you next year! magazine Ronnie [email protected] https://play.google.com /store/books/author?id= Ronnie+Tucker http://www.magzter.com/ publishers/Full-Circle

full circle magazine #1 04 3 contents ^ NNEEWWSS Submitted by Arnfried Walbrecht

CISCO EVOLVES IOS XR more programmability to enable a ecently, AMD claimed that the Source: higher degree of network http://techfrag.com/201 5/1 1 /28/a NETWORK OPERATING R company will provide over a automation. Technologies such as 1 00% performance boost in some md-crimson-driver-downgrades- SYSTEM WITH LINUX puppet and chef for orchestration Linux games via the Crimson performance-on-linux/ are now also enabled for Driver. The stats they showed were t the core of Cisco's big automation. impressive so we expected Linux A routers has long been the IOS- performance to improve. AMD SOME XR network . IOS- "We built an infrastructure that shared a few slides which showed DEVICES HAVE PREDICTABLE XR is now evolving, thanks to a allows people to run theirown 1 1 2% performance boost in rebasing on Linux and the inputs of applications in Linux containers on Bioshock Infinite, 1 1 3% in DOTA SSH HOST KEYS Cisco's hyperscale web partners. the routeritself,"Wollenweber and a staggering 1 55% in Total Kevin Wollenweber, director of said. War. aspberry Pi devices running on product management for Cisco’s R Raspbian may need to be service provider segment, Cisco is using Linux Containers But is the performance actually patched to avoid a security issue explained that the new IOS-XR 6.0 (LXC) as the container technology. as good as they claim? While that results in the device release provides improved visibility Wollenweber explained that IOS- Windows users look pretty happy generating weak and predictable into a network with a feature XR is now based on a Linux about Crimson and the SSH keys. Raspbian is a free called telemetry. Wollenweber infrastructure, which is what optimizations it brought, how does operating system based on explained, that in the past, many enables more toolchains and AMD users feel about this? optimized for Raspberry Pi network devices used old approach standard interfaces. Actually it downgrades hardware. According to developer such as SNMP traps that probe a performance compared to AMD oittaa, the issue resides in the way network in order to get Source: Catalyst 1 5.9. AMD really dropped Raspbian generates SSH keys. information. http://www.enterprisenetworking the ball on this one and once again planet.com/netos/cisco-evolves- Linux players screwed over. "As soon as the systems starts "What we've done with -xr-network-operating-system- up, systemd-random-seed tries to telemetry is we have built a with-linux.html It looks like AMD Crimson seed /dev/urandom, but publisher/subscribermodel where Driver is not the way to go for /var/lib/systemd/random-seed is devices push out information at Linux users, so they better stick missing, because it hasn't been regularintervals,"Wollenweber AMD CRIMSON DRIVER with Catalyst for now. Well, at least created yet," explains the said. until AMD fixes this problem. developer. DOWNGRADES "/etc/rc2.d/S01 regenerate_ssh_ho Additionally IOS-XR provides PERFORMANCE ON LINUX st_keys is executed, but

full circle magazine #1 04 4 contents ^ NEWS /dev/urandom pool doesn't have afterthought. During that time, centered on SDN, OpenFlow and f you purchased your computer that much entropy at this point something very, very interesting network functions virtualization. I in the last decade, it probably and predictable SSH host keys will happened. Those events have seen has a 64-bit-capable processor. The be created," he continues. collaborative efforts announced transition to 64-bit operating Ubuntu GNOME 1 5.1 0. It is from the likes of AT&T, and systems has been a long one, but Source: everything vanilla Ubuntu should the . Google is about to give Linux users http://news.softpedia.com/news/s have been from the start. It's what another push. In March 201 6, ome-raspberry-pi-devices-have- every Linux SDN andNFVare Google will stop releasing Chrome predictable-ssh-host-keys- should aim to be. In fact, this was the future ofnetworking andfuture for 32-bit Linux distributions. In an 496864.shtml the first time, since I've been using ofourindustry. Transitioning ONS to update posted to the Chromium- Linux, that I completed an the Linux Foundation allows ONS to dev mailing list, Google’s Dirk installation of a distribution and buildon its successes as the premier Pranke wrote: UBUNTU GNOME 1 5.1 0: actually struggled to find a event shaping the future ofSDN and necessary tweak. NFVto help grow the community “To provide the best experience THE PERFECT LINUX andaccelerate adoption ofopen forthe most-usedLinux versions, we DESKTOP DISTRIBUTION Source: source SDN andNFVby network will endsupport forGoogle Chrome http://www.techrepublic.com/artic operators andvendors,”said ONS on 32-bit Linux, Ubuntu Precise or the longest time I'd been le/ubuntu--1 5-1 0-the- Chair Guru Parulkar. “The ONS team (12.04), andDebian 7 (wheezy) in F heralding Ubuntu and its perfect-linux-desktop-distribution/ looks forwardto working with the early March, 2016. Chrome will desktop as one of the best Linux Linux Foundation team to make continue to function on these distributions. I liked Unity… a lot. 2016 a resounding success.” platforms but will no longerreceive The design was beautiful, and LINUX FOUNDATION ADDS updates andsecurity fixes. workflow about as efficient as you Source: OPEN NETWORKING SUMMIT would ever find. The Dash, the http://www.rcrwireless.com/201 51 We intendto continue supporting Launcher, the HUD… they all came TO EVENT PORTFOLIO 201 /telecom-/linux- the 32-bit buildconfigurations on together in a perfect storm of foundation-adds-open-networking- Linux to support building Chromium. form and function. he Linux Foundation is adding summit-to-event-portfolio-tag2 Ifyou are using Precise, we’d T the Open Networking Summit recommendthat you to upgrade to But then things seem to sour a to its event portfolio beginning Trusty.” bit. First the releases seemed to with the next show scheduled for GOOGLE'S KILLING CHROME offer little to no improvements. March 1 4 in Santa Clara, California. Source: SUPPORT FOR 32-BIT LINUX, With the developers working http://www.pcworld.com/article/3 desperately to bring to life the The ONS was initially started by UBUNTU 1 2.04, AND 01 0404/browsers/-killing- next iteration of Unity (Unity companies focused on software- DEBIAN 7 chrome-support-for-32-bit-linux- 8/), it seemed the desktop, as it defined networking technologies ubuntu-1 204-and-debian-7.html stood, had become an to enable collaboration efforts

full circle magazine #1 04 5 contents ^ NEWS

their patent attacks against Linux "Free" and "open" are the Apple's Xcode IDE and Objective-C players. was used to create all Apple apps. MICROSOFT BRINGS DEBIAN adjectives that best describe the development ethos that allowed A year later, Apple surprised again GNU/LINUX TO AZURE There is actually no hypocrisy Linux and the Internet to happen. by promising to open source the here. It’s pure business. Swift platform this year. CLOUD Yes, there were regulations around, but Linux and the Net Source: By opening up the platform icrosoft has collaborated grew up outside the scope of what http://www.itworld.com/article/30 beyond the confines of Cupertino, M with credativ to offer Debian Bob Frankston calls The 1 1 41 9/operating- Apple expects others to contribute GNU/Linux as an endorsed Regulatorium. To a blessed degree systems/microsoft-brings-debian- to the Swift language as it distribution on its Azure cloud. they still do, but that degree is gnu-linux-to-azure-cloud.html matures. Along with the open Microsoft already had ties with getting narrower and less blessed source launch, Apple has already SUSE and Canonical to offer as more of our computing and published a Swift port for Linux openSUSE, SLE and Ubuntu on communicating moves to mobile computers. To use the Linux port, Azure cloud. It also had deals with CAN WE SAVE WIRELESS devices. you'll need an x84, 64-bit OpenLogic to offer Red Hat’s FROM REGULATORS? computer, and use either the CentOS. And after a very long wait, Source: to build Swift yourself Microsoft struck a deal with Red http://www.linuxjournal.com/cont inux was born and grew within or download pre-built binaries for Hat to bring RHEL to its cloud. That ent/can-we-save-wireless- L an ecosystem of norms, not Ubuntu. Apple says the port is a left Debian, one of the most regulators laws. Those norms were those of work in progress, but useful to popular GNU/Linux distributions programming (C), operating experiment with Swift on a Linux on servers, behind. Until now. systems (*NIX), command shells machine. Customers can now easily (bash, etc), e-mail (SMTP, etc), APPLE OPEN SOURCES SWIFT provision Debian-based virtual licenses (GPL, etc), and Internet Source: machines in Microsoft Azure. There AND MAKES A LINUX PORT protocols (TCP/IP and the rest). http://www.zdnet.com/article/appl are two supported versions of AVAILABLE e-open-sources-swift-and-already- Debian available for Azure: Debian Had Linux and the Internet makes-a-linux-port-available/ 7 (codename “wheezy”) and been left up to the world's big ou no longer need a Mac Debian 8 (codename “jessie”), both operating system and network Y computer to build apps using built by credativ. providers, we never would have Apple's newest code platform: had either one. Instead, we would Apple made its Swift programming LINUX FOUNDATION: Passionate Linux fans may have had what business giants and language open source on Thursday, SHAPING OUR SOFTWARE- criticize Microsoft for being just as Google has done for Dart. their captive regulators are DEFINED FUTURE hypocritical: at one hand they inclined to believe what both The company introduced Swift as a display their love for Linux, and on actually are: "intellectual property" surprise during its 201 4 Worldwide the other hand they continue with Developers Conference. Until then ver the past decade, Linux and billable "services". O has gone from scrappy

full circle magazine #1 04 6 contents ^ NEWS insurgent to mainstream choice for Source: entropy and infiltration… one that "Firefox OS provedthe flexibility the enterprise data center. Linux http://www.infoworld.com/article/ can overcome. ofthe Web, scaling from low-end has ruled the cloud from the 301 2253/linux/linux-foundation- all the way up to HD beginning, and while it flopped on shaping-our-software-defined- Source: TVs. However, we weren't able to the desktop, it has an 83 percent future.html http://www.techrepublic.com/artic offerthe best userexperience share of smartphones in the form le/the-insecurity-of-platforms-and- possible andso we will stop offering of Android, which is built on the how-open-source-overcomes/ Firefox OS smartphones through . Plus, Linux pretty THE INSECURITY OF carrierchannels." much owns the embedded market, PLATFORMS AND HOW OPEN from TVs to cars to new IoT LINUX SMARTPHONES TOOK This is definitely sad news for devices. SOURCE OVERCOMES IT those looking forward to a free A SERIOUS STEP BACK IN system for their smartphones. But Jim Zemlin, executive director ll platforms are insecure. They 201 5 the onslaught of bummer-inducing of the Linux Foundation, has A can all be exploited in one way news doesn't end there. , the watched these triumphs up close or another. At some point in time, 01 5 was such a hopeful year company behind Sailfish OS, is during his 1 0-year tenure with the it will be announced that no 2 for Linux on smartphones. At having some serious problems… organization. During that time, the operating system is invulnerable the beginning of the year, there including layoffs. The company is Linux Foundation has quietly and every single one of them has was so much hope for what could now, according to Antti Saarnio expanded to encompass 26 their kryptonite. Every. Single. be. The promise of (Jolla Chairman of the Board), collaborative projects, including One. being available on shipping devices "fighting for its survival." such marquee ventures as Cloud was alluring. FirefoxOS phones Foundry, Node.js, OpenDaylight, Windows. OSX. Linux. Android. were already shipping… and the Source: and Xen. iOS. None of them are one future was looking bright. And http://www.networkworld.com/art hundred percent safe. Plug them Jolla was gearing up for a new icle/301 3493/opensource- The Linux Foundation also puts into a network and their security is iteration of their Linux-powered subnet/linux-smartphones-mozilla- on dozens of live events, including compromised. It doesn't matter OS, along with a shiny new tablet firefox-os.html the Apache Software Foundation’s how well the platform is designed, to go with it. conferences, and runs a booming there will be those up to the training business. For example, challenge of taking it down. Then – at the #mozlando ADOBE RELEASES MASSIVE says Zemlin, hundreds of conference on Tuesday, December thousands of aspiring admins take However, there is one platform 8th – Mozilla announced that they SECURITY UPDATE FOR Linux courses offered by the that is better suited for would no longer be working with LINUX FLASH PLAYER Foundation on edX for free. overcoming that which ails the carriers to ship Firefox OS phones. flawed ones and zeros. One Mozilla issued the following dobe abandoned active platform that is not only adept and statement, via TechCrunch: A development for the Flash agile enough to run toe-to-toe with Player on Linux a while back and is

full circle magazine #1 04 7 contents ^ NEWS now only releasing security rescue partitions or special CDs to inux Lord says DELL AND RED HAT DELIVER upgrades. The company just L the fourth release candidate of update firmware. released a massive security Linux 4.4 contained “a fairly bad EASIER FIRMWARE UPDATES update, and it looks like the Linux The new support for firmware core bug” that's since been FOR LINUX USERS platform is covered as well. squashed, but may not have rung updates from Dell will change this. Now, Linux users can upgrade many alarm bells anyway. ell -- the first big company to Flash is so well embedded on firmware from the comfort of their D sell Linux computers -- is the Internet that it's really difficult production desktop environments. “Another week, another rc,” catering to open source fans again to get rid of. Despite being Torvalds writes on the Linux Kernel by announcing plans to make user- shunned by all the major players Source: mailing list, before going on to say friendly firmware upgrades like YouTube, Facebook, Apple, and http://thevarguy.com/open- that development work is possible on Linux. pretty much everyone else, it's still progressing as usual save for “... a source-application-software- present all over the place. That companies/dell-and-red-hat- fairly bad core bug that was In a post, Richard Hughes, means that all the security deliver-easier-firmware-updates- introduced in rc4 that is now fixed who works for Red Hat (RHT) and problems are still present, and linux- in rc5”. contributes to the GNOME project, they need to be dealt with. us?utm_source=feedburner&utm_ writes that Red Hat and Dell have medium=feed&utm_campaign=Fee Torvalds declares that bug “a been collaborating on a system The Flash Player for Linux has d%3A+TheVarGuy+%28The+VAR+ bit embarrassing,” but added “I that will allow users of Dell been stuck at version 1 1 .x for Guy%29 don't think that many people hardware to update firmware from many years, and it's not going to actually ever hit the problem.” Linux. If that doesn't seem advance. It will stay in that branch significant to you, it's probably until it is declared dead, but, from Torvalds' next problem is because you either do not use CORE DEVELOPER JEFF time to time, Adobe remembers deciding when to schedule the Linux or have not spent enough of that there are Linux users as well GARZIK ON THE SIMILARITIES release of version 4.4. He's tossing your life geeking out to know what and that they might be affected. up pausing things for a week to let firmware is. For a long time, most BETWEEN BITCOIN AND people enjoy the season, or major hardware companies have LINUX Source: proceeding at the usual pace and offered tools that make it possible http://news.softpedia.com/news/a waiting a week before opening the to update firmware from Windows efore making any dobe-releases-massive-security- version 4.5 merge window. by relying on some tricks that B contributions to Bitcoin, Bloq update-for-linux-flash-player- allow the firmware to change Co-Founder and Bitcoin Core 497360.shtml Source: without crashing the system. But Developer Jeff Garzik was a http://www.theregister.co.uk/201 5 none of these tools has been longtime Linux developer who /1 2/1 4/fairly_bad_core_bug_crush available for Linux. Instead, Linux started working on the operating 'FAIRLY BAD CORE BUG' ed_in_linux_44rc5/ users have had to rely on the system in the early nineties — CRUSHED IN LINUX 4.4-RC5 archaic method of booting to before the creation of Red Hat. As

full circle magazine #1 04 8 contents ^ NEWS someone who was involved in the he Linux Foundation, the Linux Foundation. "We're excited backspace 28 times, when the early development of both Linux T nonprofit organization to welcome these members to our machine asks for your username, and Bitcoin, Garzik has a unique enabling mass innovation through organization as we enter another accesses the “Grub rescue ,” perspective on the common open source, today is announcing exciting year of collaboration." and once there, you can access the themes found in the two three new silver members are computer’s data or install malware. respective development joining the organization: Autodesk, Source: Fortunately, Marco and Ripoll have communities. One of the key Concurrent Computer Corporation, http://money.cnn.com/news/newsf made an emergency patch to fix attributes of both Bitcoin and and DataKinetics. eeds/articles/marketwire/1 23531 1 the Grub2 vulnerability. Ubuntu, Linux development is that both .htm Red Hat, and Debian have all open-source platforms were Thousands of developers and issued patches to fix it as well. originally maintained by more than 600 organizations work volunteers. Garzik explained: across Linux Foundation-hosted YOU CAN BREAK INTO A Source: http://lifehacker.com/you-can- projects. From container LINUX SYSTEM BY PRESSING “I see so many parallels technologies and application break-into-a-linux-system-by- between Bitcoin and Linux in that, platforms to datacenter operating BACKSPACE 28 TIMES. pressing-backspace-1 748370796 in the early days of Linux, you had systems and networking, The Linux HERE’S HOW TO FIX IT university students [and] Foundation provides critical professional engineers working in services to support every corner of itting a key over and over their spare time with this stuff. It technology infrastructure. By H again actually works for once. was really very early stage early growing the member ecosystem to Two security researchers in Spain efforts, and with Bitcoin it is very include software solutions and big recently uncovered a strange bug much the same way.” data processing experts, The Linux that will let you into most Linux Foundation further unites the machines just by hitting the Source: world's leading technologists to backspace key 28 times. Here’s http://insidebitcoins.com/news/cor drive open innovation on a global how to fix it and keep your data e-developer-jeff-garzik-on-the- scale. protected. similarities-between-bitcoin-and- linux/36223 "Open source has become the The researchers, Hector Marco de facto way to create software. and Ismael Ripoll from the The Linux Foundation provides a Cybersecurity Group at Polytechnic LINUX FOUNDATION DRIVES neutral home for organizations to University of Valencia, found that MASS INNOVATION develop technology at scale and at it’s possible to bypass all security a rate that can't be matched of a locked-down Linux machine by THROUGH OPEN SOURCE working on their own," said Jim exploiting a bug in the Grub2 WITH NEW MEMBERS Zemlin, executive director, The bootloader. Essentially, hitting

full circle magazine #1 04 9 contents ^ CCOOMMMMAANNDD && CCOONNQQUUEERR UUbbuunnttuu PPhhoonnee WWeebbaappppss Written by Lucas Westermann

s promised last month, I’ll be As an example, I’ll briefly cover interface (as normal) by setting the include an answer in my next A covering some more ubuntu how to create a webapp for login page to the default URL (last article. phone programming. While opening the Full Circle Magazine URL in the Exec line). If you want to preparing for this article, I have site. use the OnlineAccounts API, you’ll In general - is there something looked at most of the tutorials apparently need to use a fully- you’d like to see more of from me from Ubuntu itself. They are well • Create a new Webapp project fledged HTML5 app. If the site in 201 6? All answers can be written, and definitely a good spot • Open .desktop you’re connecting to also offers an emailed to: to start. I will focus on more • Edit the exec line to read: API, using an HTML5 app (and lswest34+fcm@.com. general approaches - what app Exec=webapp-container -- asking for credentials in settings), type to use for what purpose, as enable-back-forward --store- you should be able to connect via I hope everyone’s had a good session-cookies -- API as well. See the examples on year, and thank you for reading well as a small example of a web webappUrlPatterns=https?://fu app. llcirclemagazine.org/* the Ubuntu page for more details. C&C! http://fullcirclemagazine.org • Replace .png with a QML APP FURTHER READING APP TYPES 1 28px x 1 28px icon (eg. the FCM HTML5 apps: circular logo). • HTML5 app - this is a full-fledged I was planning on also including https://developer.ubuntu.com/en/ a QML app example here, but have apps/html-5/tutorials/ HTML app. If you’re a web The important step is the third faced various issues with Get started: developer and want to create a one. Here you indicate the allowed translations and the make files https://developer.ubuntu.com/en/ specific HTML5 app for Ubuntu, URL patterns - in this case we allow required for compiling a QML app. apps//tutorials/building-your- you’ll want this. any https or http (https?://) Instead, I’m trying to fix the issues, first-qml-app/ • Webapp - this is the app type you connection to so that I can hopefully cover QML Webapp: use to open an existing page, in fullcirclemagazine.org, and its apps in my next article. https://developer.ubuntu.com/en/ order to run it like an app. subpages (/*). This way, the site web/tutorials/ • QML - A native app for Ubuntu can be browsed. It’s possible to QML Apps: (written in QML, which is the supply multiple patterns - for QUESTIONS FOR READERS https://developer.ubuntu.com/en/ Meta Language). example for subdomains. • Scopes - These can be written in Are there any Ubuntu phone apps/qml/tutorials/ Scopes: various languages, and combined As you can see - creating a basic apps you can’t live without? Or https://developer.ubuntu.com/en/ with APIs. webapp is extremely simple. If you maybe there’s a particular style of scopes/tutorials/ want to connect an account, you app you’re curious about. Send me WEBAPP can either log in via the web an email, and I will see if I can’t

full circle magazine #1 04 1 0 contents ^ HHOOWW--TTOO Programming In Python Pt. 62 Written by Greg D. Walters Programming In Python Pt. 62

y the time you read this, it will (http://fritzing.org/home/). Not on some of the electronic one. In the case of the LED B probably be old news that only can you keep copies of our components we will be using this projects, we will be using resistors there is a new Raspberry Pi that projects locally, you also can have time, Resistors, LEDs and Switches. so that they will reduce the was released on November 26, some fun designing your own amount of electricity flowing 201 5. It's called the Raspberry Pi circuits. RESISTORS through the LED (and the GPIO Zero and the price is an pin), to keep it from burning out. unbelievable $5 U.S. or 4! . I A QUICK DISCUSSION OF A resistor is a device that haven't had a chance to find any For a more detailed discussion OUR COMPONENTS 'resists' the flow of electricity to a actual dimensions, but they say it given extent. This will allow us to of resistors, please see: is about the size of a stick of gum. https://learn.sparkfun.com/tutorial One more thing before we get limit the amount of electricity that So if you've been holding off flows through a circuit or part of s/resistors. getting your new Pi due to cost, started, which is a quick discussion now you don't have an excuse. We LEDS will discuss the Pi Zero in future articles.

Now back to my Physical Programming series. This time we are going to start actually controlling things. Hopefully, you have been able to procure some LEDs, resistors, switches, jumpers and a breadboard.

As we go through the series, I LEDs are Light Emitting Diodes will be using a free design tool and are the “standard” called Fritzing to provide a visual replacements for bulbs in just representation of what the project about everything. With a little care wiring should look like. in design, they will last almost forever. An LED has two You might want to get yourself leads/wires called Anode and a copy from their website Cathode. The Anode is the positive

full circle magazine #1 04 1 1 contents ^ HOWTO - PYTHON side and the Cathode is the negative side. OUR FIRST PROJECT...

If you have a new LED directly Now let's get started with our out of the package, you will notice first construction project. It's a that one of the leads is longer than very simple electronics version of the other. That is the Anode or the “hello world”. We will connect a positive side. If both leads on a switch to one of the GPIO pins and new device are the same length (or monitor it to catch the press of the if you are recycling parts from an button. old circuit board), look for the flat edge. That will always show the Shown right is the actual Cathode or negative lead. schematic that we will be working with.

SWITCHES So we have a switch that is connected between ground pin The switch I chose to use for and GPIO pin 1 7 which is physical this project is one that easily pin 1 1 . We also have an LED mounts in the breadboard or on a connected with its cathode to circuit board. It is simply square GPIO pin 1 8 (physical pin 1 2) and with a small round momentary its anode connected to a resistor button on the top. It also has 4 that connects to the 3.3volt pin on pins. The trick is to know which the Pi. It is at this point that you two pins of the four will be the need to make a decision. Will you ones we need. You could take an reference the pins by their position ohm-meter and run across all the on the board, or the GPIO combinations of pins until you find numbers. We'll get back to that in the set that works, or you could a minute. In the meantime, here's just look at the layout of the pins the wiring diagram… that connect it to the breadboard. The two pins to be used have the You can see on the breadboard leads that grip into the board the three components...the switch, pointing at each other. You only the LED and the resistor. The first need one set of pins, so just pick pin on the RPi is the one on the top the set you wish. right. That pin provides the 3.3

full circle magazine #1 04 1 2 contents ^ HOWTO - PYTHON volts DC that we need to power If you have been keeping up so import RPi.GPIO as GPIO our project. The pin below it is far, you will notice that I am giving counted as pin #2. Pin #6 is a both the physical pin number as # If you are using the BCM GPIO pin numbers... ground pin. Note that both of well as the BCM GPIO pin number. #LedPin = 18 those pins have wire connectors #BtnPin = 17 The “BCM” stands for Broadcom, # Otherwise the physical board numbers... that go to the long horizontal and, in our code, we will have to LedPin = 12 buses on the breadboard. Some tell the RPi.GPIO library if we are BtnPin = 11 breadboards have a “+” and “-” on using board numbering or BCM the power bus to help you numbering. This is the decision I to be very nice, but it gives you references, and it defines the remember which bus is which. I was referring to earlier. In our only the BCM numbers on the pins. Output pin to drive the LED and also have a long jumper from the code, we will have to be consistent Our next bit of code (shown the pin that the signal from the positive 3.3 volt bus at the top of with one numbering scheme or the below) will be a function called button will be coming in on. Also the breadboard down to the bus other. In the code we are about to “setup”, where we set up the notice that we define the pin for on the bottom. It really doesn't look at, I provide both, and you can information for the library to use. the button to have a pull-up matter which bus on the comment out whichever one you resistor. This means that the breadboard you use for your don't want to use. My personal Notice that the first line is signal-line will be at 3.3 volts and power, as long as you are preference is to use the BCM GPIO commented out since I will be when the button is pressed it is consistent. numbers, but for this project, I will using the board numbering in this pulled down to ground. stick with the physical board pin example, but it's there to show you There is a short jumper going numbers. Now let's get into the how to make the call. Our next function (following from the top ground bus to one code. page, top right) is called loop, and, side of the switch and the other Lines 3 and 4 show how to as the name suggests, we simply side of the switch connects to As always, I will break the code define what the pins will be, either do a loop, checking the button physical pin 1 1 on the RPi (or GPIO into parts and discuss each one. input or output, and if we use the input pin to see if it has been pin 1 7). As for the LED, the First (top right) we have to import internal pull up resistors built-in on pulled low. If it has, then we turn Cathode is connected to the the RPi.GPIO library, and we will the RPi or not. So basically this the LED on, otherwise we set the physical pin 1 2 on the RPi (GPIO alias it to the name “GPIO” to make portion of the code says to use LedPin to high. That might sound 1 8) and the Anode is connected to things easier to type. Next, we physical board pin numbers as counter-intuitive, but remember the resistor, which in turn is define two variables; LedPin and connected to the lower 3.3 volt BtnPin to the pin numbering def setup(): bus. Also notice that the wiring is #GPIO.setmode(GPIO.BCM) scheme we wish to use. Here, I've GPIO.setmode(GPIO.BOARD) colour coded. Red will ALWAYS (in decided to use the Physical pin GPIO.setup(LedPin, GPIO.OUT) my diagrams) be a positive voltage, numbering, since you probably GPIO.setup(BtnPin, GPIO.IN,pull_up_down=GPIO.PUD_UP) Black is for ground. Any other don't have a breakout wedge yet. colors will mean interconnections I've found the one from SparkFun for data.

full circle magazine #1 04 1 3 contents ^ HOWTO - PYTHON we have the Anode connected to the 3.3 volt bus through the def loop(): while True: resistor. This means to turn the if GPIO.input(BtnPin) == GPIO.LOW: LED on, we have to pull the print('...LED On') Cathode down to ground (0 volts) GPIO.output(LedPin,GPIO.LOW) else: level to allow the LED to turn on. print('...LED Off') The Ubuntu Podcast covers all GPIO.output(LedPin,GPIO.HIGH) the latest news and issues facing The destroy function (shown Ubuntu Linux users and Free below) basically cleans up the Software fans in general. The our loop routine reads the level or authors to have room for their states of the pins so we don't get show appeals to the newest user status of the button pin and once articles. Keep everything close at any errors the next time we need and the oldest coder. Our the voltage goes low, it says hand, because we will be using the to use them. discussions cover the “oh...the button input is low, so I same hardware setup next time. development of Ubuntu but need to turn on the LED”. Finally, we use the “main loop” aren’t overly technical. We are Enjoy playing for now and I will (shown bottom) to call the lucky enough to have some One other thing to notice is see you next month. routines in the proper order and to great guests on the show, telling that our first and second routines allow us an easy way to break out us first hand about the latest are named “setup” and “loop”. It is of the loop by pressing the Ctrl-C exciting developments they are a good thing to keep this format, key sequence. working on, in a way that we can because when we get to the all understand! We also talk Arduino programming, these two So, load the program into your about the Ubuntu community routines are required. RPi and run it. You will notice the and what it gets up to. text “...LED Off” keeps repeating We are going to stop here for on the screen until you press the The show is presented by this month. I want the other button. That is due to the fact that members of the UK’s Ubuntu Linux community. Because it is def destroy(): covered by the Ubuntu Code of GPIO.output(LedPin,GPIO.HIGH) Conduct it is suitable for all. GPIO.cleanup() The show is broadcast live every Greg Walters is owner of RainyDay fortnight on a Tuesday evening if __name__ == '__main__': Solutions, LLC, a consulting company setup() in Aurora, Colorado, and has been (British time) and is available for try: programming since 1 972. He enjoys download the following day. loop() cooking, hiking, music, and spending except KeyboardInterrupt: time with his family. His website is podcast.ubuntu-uk.org destroy() www.thedesignatedgeek.net.

full circle magazine #1 04 1 4 contents ^ HHOOWW--TTOO LibreOffice Pt.55 - Fontwork Written by Elmer Perry LibreOffice Pt.55 - Fontwork

ave you ever been working on object becomes an object just like Toolbars > Drawing). You can also you would any text. You can use H a document – let's say, a any other object in LibreOffice, and access the Fontwork Gallery the tools in the formatting toolbar newsletter – and you wanted to you can use all the object tools on through the menus, Insert > Media to change the font, bold, and italic, format some fancy text? Bold, it. Think of Fontwork as a drawing > Fontwork Gallery. In the gallery, but, depending on the shape you italic, and other standard object made from text. you see many different shapes of chose, it may not have much effect formatting options were not the text “Fontwork.” Select the on your results. However, as with enough. You wanted the text to CREATE A FONTWORK shape that is close to what you anything, I encourage you to play have shape. You could load up want for a final product. Click OK. with it. You never know what OBJECT GiMP or Inkscape, but wouldn't you results you might get. The rather do it directly in the Now, you have a Fontwork alignment tools have no effect as document? Well, with Fontwork, object, but the text is not the text the Fontwork object has its own you can. Fontwork is a tool in you want, unless you are creating alignment tool as we will see later. LibreOffice that allows you to an ad for Fontwork. Double-click “shape” text – bend and twist it at on the Fontwork object and the A yellow dot appears in every your will. No, it's not magic, but is text will appear over the object. Fontwork object. The dot’s so simple you'll swear it is. Okay, Here you can edit the text just as location is different depending on you shouldn't swear, but it's really cool.

Fontwork is a tool you don't use every day. It is a special tool for special occasions. Fontwork, as the name suggests, is a tool to manipulate the font of your text, give it a shape, and maybe turn it To create a Fontwork object, we into art. You start with the need to access the Fontwork Fontwork Gallery by selecting a Gallery. There are two toolbars starting pattern. From there, you that contain a Fontwork Gallery take your generic pattern and button, the Fontwork toolbar make it your own by changing the (View > Toolbars > Fontwork) and font, character spacing, shape, the Drawing toolbar (View > color, fill, and more. The Fontwork

full circle magazine #1 04 1 5 contents ^ HOWTO - LIBREOFFICE the shape you have chosen for toolbar. The 3D toolbar has your text. If you hover over the settings for tilting up, down, left, dot, the pointer turns into a hand and right; depth of the extrusion; symbol. Click and drag the dot to the direction or perspective; and adjust the effect of the shape of the direction of the lighting. You your text. can select between surface types of Wireframe, Matt, Plastic, and The other eight dots around the Metal. You can create a contrast object are called handles. You can effect by selecting a different drag these handles to resize the color for the extrusion portion of object. Resizing from the corners the object. can help maintain the aspect ratio of the object, but if you need to gallery. really give you some cool effects is OTHER FORMATTING squash or pinch the object to get the stretch justify. Stretch justify the desired effect, then the four • Fontwork Same Letter Height – will stretch smaller words to fill When you have a Fontwork side handles are there as well. this makes all characters in the the shape of the object. object selected, the formatting text the same height regardless of toolbar converts to the Drawing FONTWORK TOOLBAR the case. Even if they are all • Fontwork Character Spacing – Object Properties toolbar. Here lowercase, a lowercase e will this setting controls the spacing you can change the line color, line The Fontwork toolbar provides stretch to the size of a lowercase h. between the individual characters style, and color of the text. You can the basic tools for editing a The effect enhances many of the in the text. The setting ranges also change the anchor position of Fontwork object. These tools allow different shapes, and results will from very tight (letters right the object and how text will wrap you to further tweak the Fontwork vary according to your text and against each other) through very around the object. You can also object into the final product. You desired results. loose (spread out). There is also a rotate the object, and since the will want to try each tool to see custom option where you specify a background of the object is how it affects your design. • Fontwork Alignment – this tool percentage of the character width. transparent, you can move the has no effect unless you have object up and down in a stack of • Fontwork Gallery – opens the multiple lines in your text. Right, • Extrusion On/Off – this switches objects to create other effects. Fontwork Gallery. left, and center are pretty self- the 3D effect on and off. When on, You can also group it with other explanatory, but the one that can you will see the 3D Settings objects, images and shapes, to • Fontwork Shape – if you change create some interesting graphic your mind about the shape you effects for your documents. want, you can select it here without having to delete your In addition, you can bring up object and select again from the the full dialogs through Format >

full circle magazine #1 04 1 6 contents ^ HOWTO - LIBREOFFICE Object, or through the right-click menu. Here you can open the full area dialog which allows you to add shadows and other features not available in the toolbars. I have discussed some of these features in past articles. You can, for the most part, think of the Fontwork as just another object like an image or a shape.

Fontwork is a quick and easy way to manipulate text in a creative way for your documents. Fontwork is available in all of the LibreOffice applications, making it easy to integrate with other objects. After you create a Fontwork object, you can edit it to form the object you want. Fontwork is just one more tool in the LibreOffice suite.

Elmer Perry's history of working, and programming, computers involves an Apple ][E, adding some Amiga, a generous helping of DOS and Windows, a dash of Unix, and blend well with Linux and Ubuntu. He at http://eeperry.wordpress.com

full circle magazine #1 04 1 7 contents ^ HHOOWW--TTOO Install Mint On A Two Disk Raid 0 Set Written by Jan Mussche Install Mint On A Two Disk Raid 0 Set

nstalling an OS on RAID disks is RAID stands for Redundant original data can be brought back, only reading/writing half of the I something not publicised with Array of Independent (or one way or another. total amount of data which every distribution. Ubuntu used to Inexpensive) Disks. reduces the read/write time. With have the alternative setup with RAID was invented in a time RAID 0, since no redundant data is which it was possible to create a The Hardware: when disks were not so written onto both disk partitions, RAID system, but I think it was • Disks: because you need more dependable, at least not the you get a new “disk” with a free around 1 2.04 or 1 2.1 0 when they than 1 physical disk to build a RAID. smaller ones. The bigger disks, writable area with a size equal to stopped releasing it. OpenSuse One disk with several partitions which at that time cost a fortune, the sum of the disk partitions used still has it in their extremely (which will then be called disks) were better, but nobody could to create the RAID. versatile installation program. won't do the job. afford them. By placing together • Independent: because, as I just smaller disks, and adding extra Because RAID 0 has no In this article, which is a rewrite wrote, the disks have to be real data, a system was created to get redundant data a warning is in of a story Tartifola wrote on the physical disks which can operate disk systems with more capacity, order: Should a disk go haywire, Mint forums on Wed Jun 26, 201 3 independently from each other. which were faster than just 1 disk, you have lost everything, both (http://forums.linuxmint.com/view With more partitions on 1 disk, and were still affordable for the your OS AND your data. With Just topic.php?f=46&t=1 38044#p73541 reading or writing on one partition majority of computer users. a Bunch Of Disks (JBOD), you will 7), all necessary steps are can't be done when another action either still have your OS on one explained to install Mint on a RAID is active. The read/write head can't RAID 0 is, technically speaking, disk or your data on the other configuration to get a really fast be in 2 places at the same time. not a RAID since there is no when one fails. With RAID 0, system. • Array: the independent disks have redundant data. Still, it is part of because all data is chopped into to be placed together as a team to the RAID family. With RAID 0, data small pieces and those pieces are First a little explanation of what perform as one disk system, in is chopped into chunks (1 6kB, written intermittently to the 2 RAID is and why it is used. what is called an array. 32kB, 64kB, 1 28kB, 256kB, 51 2kB, disks, you will only have parts of etc) whatever has been chosen the files. You can see that you have RAID comes in several flavors, The Software: when setting up the RAID), and only parts 1 , 3, 5, 7 and 9 of a file of which 0, 1 and 5 are the most • Redundant is the software or those chunks of data are sent to when disk sdb fails. In other words, commonly used. In this article, I data part. On a RAID system, to the disks, one chunk to disk 1 , the you end up with nothing. will explain how to use RAID 0; the prevent data loss when something next chunk to disk 2, then disk 1 other RAID's are not so different, goes terribly wrong, you need to again, and so on. The hard disk Using RAID 0 means making especially setting up RAID 1 looks write extra or redundant data to controller (in this case renamed daily backups in order not to loose a lot like what will be explained the disks. This is to make sure that, RAID controller) does all this for anything. Rsync, or even nicer, here. should a disk go haywire, all your you. This means that both disks are Grsync (with GUI) is a great

full circle magazine #1 04 1 8 contents ^ HOWTO - INSTALL MINT ON RAID 0 program to do that. OS, can be done from within the In your live system you either In the picture (below left) you OS, so we will boot the computer have a partitioning program, or see the partitioning scheme for Before starting, it is a good idea with a live Mint disc (or USB stick). I you can install gparted from the the sda disk, the one for sdb is to write down the partitioning use the KDE version for this since repositories. In my KDE system, I exactly the same. Before adding scheme you plan to use. Think well this is my favorite desktop have KDE Partition Manager, so I the partitions to both disks, it is about this, it is either the key to environment. am using that. good to choose menu “Device” success or defeat. first and from that menu, you The first thing we need to do is I have used the following setup choose New Partition Table. In the A Linux operating system needs to prepare the disks we want to to install Mint in a virtual machine new smaller pop-up window, click a minimum of 2 partitions, one for use for Mint. This needs to be done in which I created 2 disks each of on Create New Partition Table and “/” (the system disk), the other for now since the disks are not used at 25GB. I made the following finally click in the Toolbar on the “swap” (extended memory placed the moment; we use only the DVD partitions on both disks: Apply button. Do this for both on disk should you run out of your or USB stick. disks. Now both disks are empty normal memory). It is, however, a and you can start making your good idea to introduce a third partitions on them. Part. Size used for Part. Size used for Raid nr. partition, one which will be used sda1: 128MB /boot sdb1: 128MB not used for “/home”. It makes re-installing sda2: 8GB / sdb2: 8GB / /md2 With the exception of sda1 , the OS, or even installing another sda3: 2GB swap sdb3: 2GB swap /md3 which is going to be used for sda4: Leftover /home sdb4: Leftover /home /md4 one, so much easier. With a “/boot”, all partitions can be separate /home partition, you can created without a file system. They keep all your data when re- will be used by the RAID setup, and installing, although it is always a a file system will be assigned to good idea to make a good backup them later: before you start. • As said, sda1 will be used by Now since the OS can't boot “/boot”. Its counterpart, sdb1 , will from a “/boot” folder within the not be used at all. It is created just RAID, we will make one more to keep both disks exactly the partition, a normal non-RAID one, same. for “/boot”. • sda2 and sdb2 will become md2 (multiple disk = RAID) and will be 1 . PREPARING THE DISKS used for “/” with a total size of 1 6GB (sda2 + sdb2 = 8 + 8 = 1 6GB ). All the operations to set up the The number 2 is used because also disks, the RAID 0, and installing the the partitions have number 2. The MD number is however free to

full circle magazine #1 04 1 9 contents ^ HOWTO - INSTALL MINT ON RAID 0 choose. 51 2kB will be used. At this stage you can launch the • sda3 and sdb3 will become md3 2. INSTALL MDADM Mint installation and follow the and will be used as swap with a To finish the partitions, I steps until it asks for the total size of 4GB In order to build a RAID, you applied an ext4 file system to installation type (ie, where you • sda4 and sdb4 will be md4 and need a program called mdadm them. have to choose if you would like to used for “/home”, making one (Multiple Disk Administrator). Use erase your entire disk and install partition of around 30GB. -get to install the most recent sudo mkfs.ext4 /dev/md2 Mint or ...). version. Open a terminal and type: sudo mkfs.ext4 /dev/md4 Right-click the line with the You will see this: sudo apt-get install mdadm unallocated portion of the disk, For Swap (md3) we have to use: choose New. A new window will When you are not used to the pop up in which you choose the terminal and typing instructions, sudo mkswap /dev/md3 size of the new partition; you you can also use your favorite select Primary partition and (with You can check the status of software installer to do the work. the exception of sda1 which will your arrays with the instruction Mind you, in the next part you will have ext4), choose unformatted as "cat /proc/mdstat": have to use the terminal. file system. Do this for all the partitions you want to have. When md4 : active RAID 0 sdb4[1] 3. Creating the array (RAID 0) sda4[0] done, click Apply to make the Choose "Manual" or “Something I created 3 arrays, one for /root, choice final. Do this for both disks. 31192064 blocks super else” (depending on your version one for swap, and the last one for 1.2 512k chunks of Mint, the last option in the list) /home using: md3 : active RAID 0 sdb3[1] and pay attention. The picture will sda3[0] sudo mdadm --create /dev/md2 now change into: --verbose --level=0 --raid- 4193280 blocks super devices=2 /dev/sda2 /dev/sdb2 1.2 512k chunks sudo mdadm --create /dev/md3 md2 : active RAID 0 sdb2[1] --verbose --level=0 --raid- sda2[0] devices=2 /dev/sda3 /dev/sdb3 16776192 blocks super sudo mdadm --create /dev/md4 1.2 512k chunks --verbose --level=0 --raid- devices=2 /dev/sda4 /dev/sdb4 unused devices: (Mind the spaces in between the used options). Because we will 4. LAUNCH THE Clicking on Continue gives you not choose the chunk size INSTALLATION this: ourselves the default value of

full circle magazine #1 04 20 contents ^ HOWTO - INSTALL MINT ON RAID 0 In the above picture, you see the machine. Choose: Continue the 3 md's (2, 3 and 4) which have Testing, and remain in the liveDVD. either the ext4 filesystem or swap. You also see the partitions which Remark: Here you see the KDE are used to build the RAID. version of the Installation Complete window. In other If the previous steps are OK, versions, the 2 buttons might have you should be able to choose to switched places. So don't just mount md2, md3 and md4 to /root, assume you have to click the right swap and /home. one – read the text on the buttons.

Click on the line that says: /dev/md2 ext4 5. INSTALL MDADM IN THE

Click on 'Change...' NEW ENVIRONMENT

Choose the items as shown in Now comes the tricky part. Just the picture bottom left. Click OK now you say? Yes, so far it was easy going, but now things are getting Do the same for md4 which will serious. After the installation of have a mount point of /home. the OS has completed, you still need to do one thing: install Md3 will be used as swap. Here mdadm in the new setup. For this you need to choose swap area you need a terminal again… where it says: Use as: Other items sorry… so open one. for swap can be left as is since they are grayed out. First you need to mount the array on which your system (/) has Finally, mount /dev/sda1 to been installed (/dev/md2 in my boot/ with file system ext4, and at case). The directory target is made the bottom of the Prepare during installation of the OS, we Partitions picture, choose /dev/sda will now use it to mount (connect) as the installation media for Grub. several parts of our installed system to it. This way we can jump Continue with the installation into the installed version very till the end but DO NOT REBOOT easily.

full circle magazine #1 04 21 contents ^ HOWTO - INSTALL MINT ON RAID 0

Type: sudo apt-get update sudo apt-get install mdadm sudo mount /dev/md2 /target/ sudo grub-install /dev/sda sudo mount --bind /dev/ /target/dev/ 6. REBOOT THE SYSTEM sudo mount --bind /sys/ /target/sys/ During reboot, you will be sudo mount --bind /proc/ asked to remove the installation /target/proc/ medium. Do this and press Enter. sudo mount /dev/sda1 You will now boot into the /target/boot/ installed OS on the RAID 0 system. (again mind the spaces in the above lines).

Before chrooting, remember to adjust the /etc/resolv.conf file in the new environment: sudo cp /etc/resolv.conf /target/etc/resolv.conf

Then you can chroot. Chroot means change root. It's a way to jump from one OS into another, in this case to the freshly installed one, which is mounted (connected) to the folder target in the live version we are still using: sudo chroot /target Jan is a 57 year young Linux enthusiast who started using Ubuntu Install the proper software in in 2008 (Hardy Heron), and is still the usual way and adjust grub to learning about Linux every single your likings: day.

full circle magazine #1 04 22 contents ^ HHOOWW--TTOO UUssee TTOOPP Written by Jürgen Weidner

any programs are available M to help in identifying the reasons why a computer is running slowly. Top goes a step further and enables the user to intervene in running processes. manipulate processes, the of the CPU during the most recent WHAT IS A PROCESS "us" the user operating system assigns a PID 1 .5 and 1 5 minutes. For better "sy" the kernel (Process ID) to each of them. accuracy, divide it by the number "ni" user jobs with low priority A process is an instance of one Usually the PID's are assigned in of CPU cores so that for example "id" the idle Mode (if it’s high, then or more connected tasks or ascending order and remain 1 .08 divided by 2 cores means that the workload is low, and vice versa) threads which are executed by the unchanged as long the system is the work for each core is 0.54. If "wa" the percentage of jobs computer. Some of them are running. this number > 1 , then a queue waiting for computing time independent, others are connected exists, and the scheduler must be Interrupts displayed in "hi" - with each other. They use THE PROGRAM ‘TOP’ invoked to allocate computing hardware interrupts and "si" hardware like the processor (CPU), time. software interrupts memory, screen, etc. The Linux To start top, we have to open a "st" (steal time) shows the amount kernel shares the available terminal and simply type in "top". Tasks: 1 40 total, 1 running, 1 38 of CPU power that a virtual hardware with the running Now the screens fills with a lot of sleeping, 0 stopped, 1 Zombie: machine is using. processes. data. To make some sense of it, The second row displays the let's take a look at the first row (in number of processes currently The fourth and the fifth rows With the help of control groups the image above): running, sleeping and stopped. The show the usage of the memory and (cgroups), we can arrange single Zombie is a so-called child process, swap - the amount in use and the processes into groups, and allocate top - 20:1 4:42 up 57 min: gives the once started by a parent process, amount that’s still free. system resources to them based current time and how long the but not ended when the parent on the priority of the group. This is computer has been in use. process was stopped. It's harmless, Below the system information the work of the scheduler, which but if many are present, they may we find the process list. It is creates a queue that handles the 1 user: number of users logged in. consume some memory and PID's. structured in 1 2 parts: processes based on their priorities. load average: 0.97, 1 .1 1 , 1 .08: The third row shows the CPU • PID the process ID To identify, control and shows the load average (workload) workload for different clients: • USER the user who has

full circle magazine #1 04 23 contents ^ HOWTO - USE TOP

started the task task details should be displayed by top may help to analyze the reduce it. For experimentation, it’s • PR process priority top. reason. Mostly it will be sufficient better to start ‘top’ in the user • NI the nice value • o the user may configure the to stop one or more processes to mode, and change the priority of • VIRT virtual memory order of the list by his own needs. fix the problem. If this is not only user tasks. Before changing • RES physical memory possible – because none of the any other tasks, please investigate • SHR shared memory WORKING WITH TOP running tasks can be terminated – what effects this will have on your • S status their priority can be reduced and system, especially for root tasks… • %CPU percentage of CPU To manipulate a process, top the priority of more important avoid making experimental or power taken by the the process offers two ways: process can be raised. A higher unjustified changes. • %MEM percentage of priority means more computing memory used by the process • To stop a program that’s no time from the processor, and vice CONCLUSION • TIME+ time since the process longer needed, or that has crashed, versa. started the k (kill) command is very useful. Top is easy to understand, so • COMMAND the command After we give the k command, top Linux, based on UNIX, works everybody can use it. It has not used to start the process asks for the PID of the program we with the UNIX system to determine only display functions, it also want to stop. After typing in the priorities. The highest level is -20, enables the user to intervene in There are some keyboard PID, top asks us to confirm the the lowest 1 9. That means the processes. shortcuts to personalize the input of the stop signal. more important a process is the information displayed by top: • To manipulate the priority of a lower is the assigned number. This task, we use the command r number is called the ‘Nice Value’ • t hides/shows the second and (renice). With it, it's possible to and is displayed, as mentioned third row in the info section (tasks, reduce or to raise the priority of a before, in the column NI in the CPU usage, etc). process. process list. • m hides or displays the fourth and the fifth row (memory, swap, The ‘r’ command may be To raise a ‘nice value’, top must etc). be started as root. To renice an Jürgen is the former author of the unknown to many users, so these now defunct YALM (Yet Another • A sorts the process list in details may help: owner (user) process, it is possible ) and a Linux user order of resource usage. to do this without root power – but since 2007. • f the user can decide what If a system is running slowly, only to raise the priority, not to

full circle magazine #1 04 24 contents ^ full circle magazine #1 04 25 contents ^ HHOOWW--TTOO Inkscape - Part 44 Written by Mark Crutch Inkscape - Part 44

hen I'm not drawing things something more indulgent. A quick apparent is that this looks like four even though we only modified the W in Inkscape, I like to spend scan through the list of LPEs sets of the UI from the Bend LPE. bottom path. For more fine- my spare time playing lead guitar reveals the suspiciously The four lines correspond to the grained control – such as keeping for a 1 970s style prog rock band coincidentally named “Envelope four sides of the path's bounding the top of the text horizontal – you called “Envelope Deformation”. So Deformation” path effect, so that box: by default they are straight have little choice but to engage in when we decided to record our seems like an obvious one to try. horizontal and vertical paths, but some manual node editing first album, it naturally fell on me After converting the text to a path by using the buttons in the same to come up with a suitable logo for (CTRL-K, then ungroup), then way as we did for the Bend LPE, With just the Envelope the band. My starting point, of applying the LPE, I found myself you can deform each side along a Deformation LPE and a bit of course, was the name of the band faced with this in bend path. The result is as though tweaking to each of the four sides, in a bold font (Impact), with a the Path Effect Editor dialog. your skeleton path is printed on a we get closer to a classic prog-rock golden gradient applied (when we rubber sheet whose sides are logo. hit the big time, no doubt our stretched, distorting the shape. record company will pay for proper For example, clicking the “Edit on- gold embossing on all our canvas” button for the Bottom merchandising, so we may as well bend path allows me to quickly start as we mean to go on). change the logo to something more suitable for an album cover. That's a good start, but it's a bit plain. I could use the Bend LPE from last time to add a bit of a curve to the whole logo, but 70’s Skipping the two checkboxes style prog-rock really calls for for now, what will be immediately One thing I find frustrating is that three of the four bend paths are not displayed when you use on- canvas editing. For tweaking the As you can see, the path shape of the path, that's not too currently being edited is displayed much of a problem. But, if you in green. Notice also that the decide to move the end nodes, it deformation stretches across the can be tricky to keep things in sync whole height of the skeleton path, so that you don't lose the

full circle magazine #1 04 26 contents ^ HOWTO - INKSCAPE sharpness of the corners. Like the order of your path's nodes without stretch some Spiro Splines or add work on the logo. Starting with Bend LPE, however, our four lines affecting their positions. some fake perspective to a set of letters made from simple paths in the UI also offer the ability to gears – although you sometimes (red), I extended and arranged link to an existing path. It can be a As to those checkboxes… as get better results if you “fix” the them to create something more bit fiddly to draw four lines that their labels imply, they are used to earlier LPEs using Path > Object to logo-like (black). match the bounding box (Object > enable or disable the top/bottom Path, at the expense of the live Objects to Guides can help), and or left/right paths in the effect. Be editing capability. then there's a lot of clicking to link aware that disabling a pair of paths them all up, but it does at least is not the same as setting them to Like all good 70’s bands, mean that you can keep an eye on a straight line, which can lead to however, halfway through writing all four paths at once – and even some confusing results. Where I this tutorial we had “artistic select nodes from more than one find these options most useful is differences” and split up. The path at a time in order to move for creating trapezoid shapes. keyboard player and bassist got them in unison. Once your editing Here's the logo with left and right custody of the name; I got the is done, simply set the opacity of paths disabled, and the top path singer and drummer. So we needed the paths to 0 to make them edited to be smaller than the a new name for the band. The disappear from sight. bottom one: singer suggested “Live Path For the “crossing over and Effects”. under” requirement, it's another One thing to watch out for with trip to the Path Effects dialog. this LPE is the direction of the “We wouldabbreviate it to LPE,”he First, as usual, I turned my separate paths. If your paths don't match said, “with the logo being something paths into a single composite path the directions that the effect more geometric made up ofthe using Path > Combine (CTRL-K). expects, you can easily end up with three letters crossing overandunder Then I added the Knot LPE, and a result like this: each other.” watched in horror as much of my path seemed to vanish completely! “So something like the Emerson, The alternative, with left and Lake andPalmerlogo?”I asked. right paths enabled, led to distortion around the bottom of “Erm… no, not at all like that. the shape. Their's is ELP, whereas ours is LPE. See the difference?” Of course you can use the Envelope Deformation LPE with “I do, but I'm not sure theirlawyers any path, not just one created from will.” If that happens to you, just use text. You can also stack it up with Path > Reverse to change the other LPEs, in case you want to Despite my misgivings, I began

full circle magazine #1 04 27 contents ^ HOWTO - INKSCAPE

Unchecking a couple of the a nice 25% gap on either side. It can be really hard to spot in paths, leaving a large void. If you checkboxes got things back on Inkscape 0.48 and, despite the want that effect you'll have to track a little. Before explaining It is possible to apply this LPE to name of the control, changing the manually break the paths yourself. what each of them does, it will a group of paths, rather than a Switcher Size parameter will have probably be more helpful to see single composite path. In that case no effect whatsoever. On 0.91 , Whichever state you choose, the final result, with the you could be dealing with different however, the switcher is however, only affects that one parameters that produced it: stroke widths as a thick line surrounded by a blue arc or circle. crossing point. You can drag the crosses over, or under, a thin one. Modifying the parameter will switcher to another crossing point The last two checkboxes let you affect the size of the circle, making in your design then change the add the width of the “under” it easier to spot the switcher on a state of that point by clicking. stroke (the one that gets the gap busy path with lots of Being able to change only one inserted) and the “crossing path” intersections. point at a time like this, with a stroke, respectively. This can be dragging process in-between, can useful to automatically But what does the switcher quickly become tiresome on a compensate for line differences in actually do? Clicking on it cycles complex design, but unfortunately complex arrangements or to have the crossing between three states: there's no way to select or change gaps that automatically adjust if the first two determine which path multiple crossings at once. you change the stroke width, has the break (and therefore, whether explicitly or just by scaling which path appears to go over the With the basics of the design your design. other), whilst the third state complete, I added a couple of As you can see, this LPE removes the break entirely. finishing touches to turn it into a automatically introduces gaps into Which brings us to the last Version 0.91 indicates these three proper logo. First I copied the a path where it crosses itself or control: Switcher size. In order to states using a blue arc with an original path and removed the LPE any other sub-path. Most of the understand what this does, I first arrowhead pointing clockwise or before using Path > Stroke to Path. controls are used to simply alter need to introduce you to the anti-clockwise for the first two This resulted in an outline version the width of the gaps. With all the switcher. With your path selected, states, and a circle with no of the logo that I could then apply checkboxes cleared, the Fixed highlight the Knot LPE in the Path arrowhead to indicate the third an extra stroke to in order to Width spinbox allows you to set a Effects dialog, then switch to Node state (0.48 offers no such thicken it. I copied this version fixed size, in pixels, for the gaps. Edit mode (F2, double-click on the indication). Unfortunately there's again, leaving me with three paths, Check the “In units of stroke path, or choose the second icon in no fourth state to break both one of which has the Knot LPE width” box, and it instead becomes the toolbox). You should now see applied. By setting the fill and a multiplier of the stroke width. the nodes of your path, as normal, stroke to white on one of the The value of 1 .50 that I've chosen but with one small addition. At one copies, and setting a thicker black just means that the gap will be of the path crossings there will be stroke on the third, I was then able 50% larger than the stroke, giving a small, white, diamond-shaped to stack the paths on top of each handle. That's the switcher. other to produce the final effect.

full circle magazine #1 04 28 contents ^ HOWTO - INKSCAPE

fixed using the Node tool by a path, then manually cut out the Thanks to the Knot LPE it didn't rubber-band selecting the two gaps. take too long to produce that nodes in question, then using the design – which is a good thing, as “Join Selected Nodes” button on the following day the singer the tool control bar to combine decided that he was leaving the them into one. Where misplaced band to go on a spiritual retreat to breaks are not due to doubled up India. Perhaps I should form an 80’s nodes, your only recourse is to style synth pop group instead. reshape your path a little. Try “Spiro Spline” sounds like a great adding a node at a nearby band name to me… intersection, then removing the one at the break, or adding another node close to the breaking There are a few things worth one. mentioning about the Knot LPE. Trying to edit the skeleton path It's also worth reiterating that a All the practice of designing our while the LPE is visible can lead to Live Path Effect takes a path as its new logo looked like it would be Inkscape crashes, especially if input, and produces a path as its particularly useful when the lead you're still using version 0.48. output. Therefore your knotted singer declared that our album Make sure you save regularly, and path is still just a path, so is limited would be called “Celtic Knot”. I know where any auto-save files are by the choice of end-caps that are quickly designed a potential album stored. Simply turning off the available in SVG. If your paths cross cover. visibility of the LPE in the Path at 90°, as in the logo example, butt Effects dialog is enough to or square caps will usually produce mitigate this problem and you can a good result. For anything else, then make it visible again however, you might find that afterwards. rounded caps are better. This restriction does limit the artistic Depending on how your effects you can get from this LPE skeleton path was produced, you when lines have to cross at shallow can also end up with unexpected angles. In the following example, Mark uses Inkscape to create three breaks in it when using the Knot the red and blue lines are broken webcomics, 'The Greys', 'Monsters, LPE. If this occurs, check for nodes using the Knot LPE with round and Inked' and 'Elvie', which can all be that are doubled up on top of each square caps. To get the effect of found at other, perhaps as the result of a the purple line, however, it was http://www.peppertop.com/ boolean operation. These can be necessary to convert the stroke to

full circle magazine #1 04 29 contents ^ full circle magazine #1 04 30 contents ^ AARRDDUUIINNOO IIDDEE 11..66..66 Written by Ronnie Tucker

his month’s Arduino article is distributed and modified within CONCLUSION T connected to my Linux Labs the terms of this license. All the article (earlier in this issue) on design files are available on Github Follow along with my future building the RepRapPro Fisher 1 (https://github.com/T3P3/Duet). Linux Labs articles and you’ll see 3D printer. How? Well, the Fisher 1 The Duet was completely designed how important this little board is is powered by a board which is using the Open Source software when it comes to 3D printing. entirely compatible with the package KiCAD (http://www.kicad- Ronnie is the founder and (still!) editor of Full Circle. He's a part-time Arduino Due. pcb.org/display/KICAD/KiCad+EDA Source: +Software+Suite) so hacking and arts and crafts sort of guy, and now http://reprap.org/wiki/Duet an Arduino tinkerer. building on this design is accessible THE DUET to all. The Duet was developed by Andy and Tony from SOFTWARE Think3dPrint3d in conjunction with RepRapPro. It’s entirely compatible Running RepRap Firmware, the with the Arduino Due and is software receives GCode (the purposely built for 3D printers. It commands that tell the printer mashes together the Due with five where to place the print head) via stepper motor controllers (the five the USB port, and from the SD card sets of seven pins at the top of the or from the Ethernet interface. The board in the photo). It also has an Arduino IDE (amongst other Ethernet port and a high speed SD things) allows the firmware to be card slot. updated, or replaced by other firmware which is not from RepRapPro. OPEN Personally, I’ve not used the According to the wiki page: The USB port for uploading files to the Duet hardware design is licensed printer, but I have used the under the CERN OHW License 1 .2 Ethernet interface and the SD card. (http://www.ohwr.org/documents/ Both work like a charm. 294): the design is free to be

full circle magazine #1 04 31 contents ^ CCHHRROOMMEE CCUULLTT Encryption Written by S. J. Webb Encryption

Chromebook does a Overall, there are many tools A wonderful job of being secure. out there to encrypt your data. If It does not allow foreign software you use a VPN and some installs, thus preventing malware. encryption tools, you should have It has secured boot to prevent strong protection on your privacy. BIOS tampering. If you use the Remember that Chrome OS is guest mode on a Chromebook, it corporate Linux, and you should erases all evidence. The SSD is use some safeguards. automatically encrypted.

However your storage peripherals are not encrypted. Once a file is selected, it only reads encrypt all of my files with these it – with no further progression. apps. If I was traveling, I would use There are some Chrome the encrypt.ion for important Extensions that can help: Virtru There are two better choices documents related to my work. I’d and Minilock. Virtru ensures for online file encryption that do rather trust an encryption tool encrypted email from a Gmail encrypt files, and are self- from a true desktop like Ubuntu or account. Minilock does file explanatory: encrypt.ion and . encryption, but it does not encrypt Encrypt, Decrypt files with Drive. USB thumb drives or SD cards. In These apps are in the Chrome Web Virtru. I would like to credit fact all of the encryption tools can Store. It is a simple drag-and-drop viking from the Manjaro forums for do only files. In time, another to encrypt a file. It is just as easy to informing me about this app. Virtru encryption app called Signal will decrypt. works with Gmail, Yahoo, and become available. Signal promises Outlook email accounts. It works encrypted messages, emails, and While these apps do safeguard for Firefox and Chrome browsers. phone calls that sync from your my files, do the files reside in their It is very simple to install. It is desktop to phone. cloud? Would it be possible for possible to send an encrypted SJ Webb is a Linux Hobbyist and someone to have access to my email one way without the other Research Coordinator. He enjoys Let’s take a look at Minilock. It’s encryption key? Both of these apps person needing to have Virtru fishing, hot rodding, and spending time with his kids and wife. He supposed to be an easy-to-use reside in the browser and are not installed. I confirmed this by thanks Mike Ferarri for his extension. However, I could not get standalone products on the sending a test email to my mentorship. an encrypted file out of the app. desktop. I would be hesitant to secondary email account.

full circle magazine #1 04 32 contents ^ HHOOWW--TTOO Write For Full Circle Magazine Written by Ronnie Tucker Write For Full Circle Magazine

GUIDELINES document. REVIEWS

he single rule for an article is • Images should be JPG, no wider T that it must somehow be than 800 pixels, and use low GAMES/APPLICATIONS linked to Ubuntu or one of the compression. When reviewing games/applications please state clearly: many derivatives of Ubuntu (, , , etc). • Do not use tables or any type of • title of the game bold or italic formatting. • who makes the game • is it free, or a paid download? RULES • where to get it from (give download/homepage URL) If you are writing a review, • is it Linux native, or did you use ? • There is no word limit for articles, please follow these guidelines : • your marks out of five but be advised that long articles • a summary with positive and negative points may be split across several issues. When you are ready to submit • For advice, please refer to the HARDWARE your article please email it to: When reviewing hardware please state clearly: Official Full Circle Style Guide: [email protected] http://url.fullcirclemagazine.org/7 5d471 • make and model of the hardware TRANSLATIONS • what category would you put this hardware into? • Write your article in whichever • any glitches that you may have had while using the hardware? software you choose, I would If you would like to translate • easy to get the hardware working in Linux? recommend LibreOffice, but most Full Circle into your native • did you have to use Windows drivers? importantly - PLEASE SPELL AND language please send an email to • marks out of five GRAMMAR CHECK IT! [email protected] and • a summary with positive and negative points we will either put you in touch with • In your article, please indicate an existing team, or give you where you would like a particular access to the raw text to translate You don't need to be an expert to write an image to be placed by indicating from. With a completed PDF, you the image name in a new will be able to upload your file to article - write about the games, applications paragraph or by embedding the the main Full Circle site. and hardware that you use every day. image in the ODT (Open Office)

full circle magazine #1 04 33 contents ^ full circle magazine #1 04 34 contents ^ LLIINNUUXX LLAABB 33DD PPrriinntteerr BBuuiilldd PPtt..11 Written by Ronnie Tucker

had always fancied buying a 3D The RepRapPro Fisher 1 uses an WHAT’S IN THE BOX? kit with everything you need. This I printer, and did some Arduino compatible board as a is the one I bought. The second, preliminary research. controller, which has a micro-SD Opening that box, and seeing slightly cheaper, is a kit with some Unfortunately, most of them didn’t port. You can either store files to all those bits, is quite intimidating. parts not included. The idea support Linux, so I wasn’t spending print on the SD card, or you can Thankfully RepRapPro has some behind this is that if you already a couple of hundred pounds on upload to the SD card from the excellent build instructions: have a 3D printer you can print one. One day, while scrolling Fisher’s interface. You connect the https://reprappro.com/documenta some parts yourself. through my Google+ feed, I saw printer to your router or, in my tion/fisher-1 . Those of you who that fellow Linux user Alan Lord case, connect it directly to a bought an earlier Fisher, which was THE BASE had been building a 3D printer desktop/laptop PC. More on direct still in beta, will notice that some with his son. I enquired about the connections near the end of this parts, and the build, are different. The first thing that needs to be printer, and its compatibility, and series when I show how I built is the base. This is a triangular with it being around the £200 connected mine directly to my I should also mention that the shaped plastic base which has mark... it was perfect! laptop. Fisher 1 comes in two flavors. The three pairs of rods connected to a first, the more expensive, is a full motor. This is the first hurdle as

full circle magazine #1 04 35 contents ^ LINUX LAB you must make sure that of the The carriages are tricky and you # Component Qty Type three motors, two must have their really need to take time to get connection pointing to the left, 242 M3x16mm cap head screw 2 Fastener these spot on. Ideally you’ll need and the third should be pointing 204 M3 Nylock nut 2 Fastener digital callipers for this as you right. Thankfully, RepRap does need to screw a couple of highlight this in the instructions. 212 M3 plain washer 2 Fastener threaded steel balls on either end 258 M3 nut 1 Fastener and the width from ball to ball is Next, the actual base. specified and needs to be exact. If Everything that’s black plastic has M3x1 6mm cap head screw, fit this needed, you may have to file down a thin film over both sides. It may what is shown in the box above. into the carriage as shown. Put an the screws to bring the balls not look like it, but it does. You M3 plain washer, then an M3 inwards to meet the target. must peel it off. That tells you exactly which bag Nylock nut, to hold it in place. to go for (Fastener), part number With three carriages made, you The Duet (the Arduino style (which is on the bag), the name of Looking at the components list slide them down the pairs of rods. board) is screwed to the base and the component, and how many at the start of the section it says you’ll need. the three pairs of rods are fed At the top of each pair of rods through holes in the base and is an idler bracket. Nearer the end screwed into place. you’ll wrap the toothed belt through carriages and over these THE TOWER idler brackets.

Three carriages are used to move three arms up and down (and Next month, it’ll be side panels, effectively, in and out). These are more rods, and (the rather tricky) created using two metal cylinders, effector assembly. one of the (in my case) supplied printed parts, and several screws and bolts.

All the screws, bolts and washers are in ziplock bags with part numbers on them. Each stage Ronnie is the founder and (still!) of the build instructions will tell editor of Full Circle. He's a part-time you exactly which screw or washer arts and crafts sort of guy, and now an Arduino tinkerer. to use. For example: Using an

full circle magazine #1 04 36 contents ^ UUBBUUNNTTUU PPHHOONNEESS Written by Ronnie Tucker

OTA-8.5 signals UBUNTU AT THE CHINA One new phone did surface (see • Fixing SIM card contact imports MOBILE WORLDWIDE photo), but it is rumoured to be his list is only a highlight of the • Fix apps installation for the time- either a prototype, or a T few changes available in this skew issues PARTNER CONFERENCE development, device. update. Please check the detailed changes for all the changes DETAILED CHANGES lthough no new devices were A announced Ubuntu Touch was included in this OTA. Milestone bug list: https://launchpad.net/canonical- shown running on a Nexus device in desktop mode. IMPORTANT FEATURES devices-system- Even though this is a bugfix image/+milestone/ww50-201 5 Strangely, the MX4 only release and no new features Ubuntu Edition was shown even were planned, we had to include though it has been sold out now one which was essential to the for quite a while. Maybe it’ll make release of one bugfix: a return? • Background playlists in media- hub

BUGFIXES As we know, each release includes a huge number of bugs - some for previous issues and some for new regressions introduced in- between. To see the overall list of what issues got fixed, please check the detailed changes below. The interesting ones are as follows: • Fix for HTML5 webapp denials • Music app high power consumption fix • Fix for UI freezes due to dbus

full circle magazine #1 04 37 contents ^ BBOOOOKK RREEVVIIEEWW Spam Nation Written by Jonathan Hoskin Spam Nation

specifically one that might be criminals he wrote about.) Illegal crime, the only way to remain considered to be the scourge of drugs were also delivered to his relevant is to get better faster our existence. We understandably door and the authorities notified, than the good guys. They remain want to keep our virtual fingertips all unbeknownst to him. Eventually on the cutting edge, and thus away from the less palatable he even made what might have everyone must remain vigilant. In portion of the Internet lest we get seemed a foolish decision to go phase two, their current status is them dirty. But knowledge of the directly to the source and he like many start-up internet people, personalities and ploys can traveled to Moscow, the center of companies; they have a good idea make us more capable of the trade that had become the but monetizing is the problem. The predicting or recognizing the next gateway to online pharmacies. But bottleneck in the Spam enterprise criminal paradigm – or at least we after all, he is an investigative had become the payment system hope. reporter and that is what they do. which, unfortunately for them, has Two major trade spam recently been subject to much Spam Nation is most obviously a partnerships, GlavMed and Rx- greater scrutiny, and they have not history of spam and the organized Promotion, would become the fared well. But you can be sure crime accompanying it, but equally major players, becoming so that, if there is a way to move important is the perseverance and significant they could advertise money around, they will get their courage exhibited by its writer. their services. hands on it. And another good bet When the newspaper he worked is that you will read about it in a for didn't have the backbone to Although not the original type, future story in the Krebs on SPAM NATION weather a possible, albeit it's the email version of SPAM that Security blog. by Brian Krebs questionable, legal retaliation for we all love to hate. It may seem like Sourcebooks Inc. his writings on the subject, Krebs the deluge of spam has ended but The spamming industry may 306 Pages started his own now famous blog: that is more likely just a temporary have started with disorganized Paperback Krebs on Security lull. While spammers email is not individual efforts but eventually ISBN: 978-1 492603238 (KrebsOnSecurity.com). Along the yet flawless, it's getting more and crystallized into an organized way he was swatted enough times more difficult for automated industry which necessarily had to he epidemic we call spam is to make it seem routine. (Swat systems to recognize the bogus address the quality issue. This had T the topic of Spam Nation by teams were surreptitiously variety and distressingly difficult less to do with honor among Brian Krebs. It is a bit unusual in directed to his home to for mere flesh and blood readers. thieves and more to do with the computer technical genre to intentionally endanger his family That is because, for cyber-badguys business practices that allow focus so sharply on one issue, and and neighbors by the very cyber- in the spam trade, like all cyber- growth and continuing profits. By

full circle magazine #1 04 38 contents ^ BOOK REVIEW now it seems that every email may have been the legitimate payoffs to government officials, Spam Nation is a book about account on the planet has received drug, a pill with no active double-crosses and organized the rise and fall of one part of hundreds of Viagra ads, mostly ingredients, or even a toxic crime style retaliations. While organized crime. There were real filtered out. For drugs that might substance, all of which might be business enterprises (that bring companies and brands like Pfizer have been of an embarrassing sold in what looked like the real money into the country but don't and Vista affected. It took the nature such as erectile blister-pack. Legal authorities were harm its citizens) are sometimes concerted effort of many dysfunction, it would make a always quick to point out the bad tolerated, eventually the country government offices/countries to limited business. But it blossomed and lethal cases even though the in question can’t deny any bring it down. There is a lot to such that online pharmaceuticals phrase “buyer beware” is relevant knowledge and must turn up the learn in this book for both sides, would cover all needs, although it for any purchase. Given most drugs heat on the miscreants. but it can't be over. History has would be curtailed in countries are made in China and India, shown that, legal or not, whenever wanting to protect their legitimate or counterfeit, it's hard Setting aside the business part, there is a demand for products and citizens/industries via more to tell what is a real item. The it's the technical wizardry that services, a more sophisticated, vigilant policing. To remain viable above mentioned organizations necessarily defines the mostly stealthy venture can emerge and the focus had to be on price, would thus look upon such unseen that keep circumvent the current business confidentiality, convenience and activities harshly if it reflected the web sites running. Their controls. Spam Nation is a book dependency. That required an poorly on their operations, and redundancy and secure record- about that process. organization. take appropriate actions. keeping gets put to the test. They have to be not just world class but One example is “Steve,” having This book has elements of a able to circumvent the best efforts gotten gonorrhea from the crime thriller, a how-to guide and a of countries trying to shut them woman, by then ex-girlfriend, who dissatisfied customer who tells all. down, and sometimes their kindly let him know the drug she You immediately know there is a competition. (Governments and was prescribed. With no co-pay, Russian connection because he corporations could learn a thing or and clearly less expensive on the starts with a list of 1 5 significant two from these guys.) But, like Internet, the purchase was a no- players in the Spam cyber-world many a murder mystery, their brainer for Steve because he had along with short descriptions of Achilles heel was and remains the also recently been let go from his their activities. It doesn’t take money. Credit card processing job. His experience may have been much convincing to decide they are networks like ChronoPay, with typical; sales operations persist not individuals you want to meet, laundering schemes and various because of satisfied repeat assuming they are alive and not in flavors of virtual money like customers. Purchasers of low free, very secure government BitCoin, were avenues taken, but volume, very expensive drugs may housing. Most of them didn't get too often for the bad guys, they not always have had a positive the money and high end lifestyle would eventually become experience. But there was never a by being nice guys, but you could undependable. guarantee, the delivered items have guessed that part. There are

full circle magazine #1 04 39 contents ^ BBOOOOKK RREEVVIIEEWW Doing Math With Python Written by Elmer Perry Doing Math With Python

some students, it could help them are clear and easy to follow. This the traditional variable to avoid get a better understand of some of book is as much a math and science confusion when the term is used in the mathematical topics discussed. book as it is a programming book. the mathematical sense. You see For young, budding scientists, the Amit has brought the three topics how to create and work with book can help them learn how to together in a very natural and fractions and complex numbers as collect and analyze data. The pleasing way. Using the computer well as do mathematical will learn to break makes it quicker and easier to operations with these number complicated problems into smaller change and play with the results. I types. Getting and verifying user's ones in order to find a solution. must admit, I had a few eureka input is given a once-over and moments myself, and times when I discussed often in the course of The book was written by Amit had to force myself to move on the book. Your first program is a Saha, a software engineer. He also because I was spending a lot of program that calculates the factors created and maintains Fedora time playing with the numbers to of a supplied number. The first big Scientific, a for get new results. step in the book is translating the scientific and educational users. root of a quadratic equation using The book is divided into 7 the functions and operators built The language of the book is chapters. The following is a short into Python. simple and easy to follow. The synopsis of each chapter. book does assume you are familiar Chapter 2, Visualizing Data August 201 5, 264 pp. with the basics of Python. The Chapter 1 , Working with Using Graphs, teaches you the ISBN: 978-1 -59327-640-9 author does a good job of teaching Numbers, is an introduction to the basics of plotting a graph using the how to break complicated formulas book. You review the different matplotlib module. You learn to re your students future down into pieces in order to avoid types of numbers you can create in feed data into the plot function, A scientists or mathematicians? long complicated statements in Python, including fractions and give the graph a title and labels, Do they seem to enjoy exploring Python. In many cases, I felt like I complex numbers. You also see create a legend, and control the the world or playing with understood the formula better how to use the basic mathematical minimum and maximum values of numbers? Or perhaps they just like after this process. The division of operators (plus, minus, the X and Y axes. After plotting creating things on the computer? large formulas into smaller multiplication, division, modulo, several single-line charts, you plot Doing Math with Python is a expressions could help a struggling and exponents) built into Python. a series of multiple-line plots, possible choice for a student or a math or science student to You learn to assign a label to a showing you how to use a graph to teacher to use to teach and succeed. The explanations of the number for use later in a program. do a comparison of two sets of enhance a student's skills. For mathematics and the programming He calls them labels rather than data. Finally, you use a formula to

full circle magazine #1 04 40 contents ^ BOOK REVIEW generate the data you plot on your import data from a comma- introduced to working with to calculate compound interest graph. This is an important step in separated value (CSV) file. CSV probability using sets. This uses and rate of change. Then you the evolution of your skills with files are a good way to get large the union and intersection of sets plunge into derivatives, including the matplotlib module. In the amounts of data into your to create an event set for partial derivatives and high-order challenges at the end of the program. calculating the probability of the derivatives. You find and plot the chapter, you even learn how to resulting set. The work with global maximum using gradient create a bar chart using the Chapter 4, Algebra and probability includes both uniform ascent. Next, you learn how to use matplotlib. Symbolic Math with SymPy, and nonuniform probabilities. SymPy to find the integrals of plunges you into the world of functions. Finally, you learn about Chapter 3, Describing Data with Algebra and symbolic math. SymPy Chapter 6, Drawing Geometric the probability density functions. Statistics, you dive into the is a module that allows you to use Shapes and Fractals, will be your exciting world of statistics. You symbols in your formula and get favorite chapter if you enjoy Whether your student is a create functions for calculating the results. After learning how to geometry. You discover how to budding mathematician, scientist, basic equations of statistics, mean, create a symbol object, you begin draw circles, animate them on a programmer, or maybe even median, mode, range, variance, to work with Algebraic graph, and even create an struggling with one of the and standard deviation. Although expressions, factoring expressions, animated trajectory chart. Next, subjects, ‘Doing Math with Python’ not directly discussed in the book, creating series, simplifying you learn about fractals and how is a great book for exploring the these functions would make a expressions, and substituting they are made. You start with a topics of computer programming, good library collected into one file. values for symbols. Then you are simple zigzag with four formulas mathematics, or science. Each You work through the complicated off solving equations and plotting with equal probability, then move topic builds on the previous to formula for calculating a equations using SymPy. This on to a Bransley Fern that uses the build a solid knowledge of each Correlation Coefficient between naturally led to plotting multiple skills of nonuniform probability topic. After ‘Teach Your Kids to two sets of numbers. You then expressions on one chart. introduced in the previous chapter. Code’ by Bryson Payne (see review learn how to create a scatter plot Overall a good time of learning in FCM#98), Doing Math with in matplotlib. If you have never Chapter 5, Playing with Sets and and creating interesting charts. Python would make a good follow- used a scatter plot before, you Probability, introduces you to up book for a secondary school learn that even though the mean, creating sets in SymPy. SymPy sets Chapter 7, Solving Calculus level code club. If you teach standard deviation, and correlation behave just like mathematical sets Problems, brings everything mathematics or science, you might of sets may look the same, scatter and give you the ability to together to discuss the most want to consider it as a plots can give a view of the data calculate subsets, supersets, and advanced math in the book. Amit supplemental text, or the topics that tells a whole new story. With a power sets. It also has the set begins by defining what a function could be expanded to create a scatter plot, you can see the operators for union, intersection, is. After a quick overview of class on its own. outliers that can skew your and Cartesian product. With these common mathematical functions, numbers. You then get a refresher tools in hand, you find yourself you dive into finding the limit of on how to import data from a text applying sets to formulas and functions. This includes some new file, and more importantly, how to getting results. You are also methods in SymPy. You use Python

full circle magazine #1 04 41 contents ^ If you would like to submit a letter for publication, compliment Join us on: or complaint, please email it to: [email protected]. LLEETTTTEERRSS PLEASE NOTE: some letters may be edited for space. goo.gl/FRTMl

facebook.com/fullcircle magazine

twitter.com/#!/fullcirclemag linkedin.com/company/full- circle-magazine ubuntuforums.org/forum display.php?f=270

FULL CIRCLE NEEDS YOU!

Without reader input Full Circle would be an empty PDF file (which I don't think many people would find particularly interesting). We are always looking for articles, reviews, anything! Even small things like letters and desktop screens help fill the magazine.

See the article Writing for Full Circle in this issue to read our basic guidelines.

Have a look at the last page of any issue to get the details of where to send your contributions.

full circle magazine #1 04 42 contents ^ If you have a Linux question, email it to: [email protected], and QQ&&AA Gord will answer them in a future issue. Please include as much Compiled by Gord Campbell information as you can about your query.

How can I identify the junk emails as I can. However, I connected ipad to g5, and I * found ls binary using whereis, but Q graphics card in my computer? sometimes the email doesn't have Q opened ipad in Nautilus, and can't find ll. Why? an unsubscribe option. everything is ok. I have videos of http://goo.gl/wNnX6Z (Thanks to Vladlenin5000 in about 3 GB space and I copied that A the ) System (Thanks to Jim_deadlockin stuff to the DCIM/1 00APPLE folder * Interactive Periodic Table Settings > Details A the Ubuntu Forums) on ipad, but no video playing app http://goo.gl/b728Oe Thunderbird has an adaptive spam recognizes anything, just like I filter, it "learns" as it goes. The didn't copy anything. * How to boot from a USB drive in I have just allowed the more messages you mark as spam VirtualBox? Q installation of the VirtualBox the more efficient it will become. (Thanks to TheFu in the http://goo.gl/gbLXU8 update to version 4.3.34 (was on Also, never "unsubscribe" from A Ubuntu Forums) Transcode 4.3.1 0). All my Virtual machines spam, it will just make it worse, the video files to a format * A timer that automatically locks now crash when loading, except just mark it as spam. supported by your ipad. Generally, the screen to take a break away for one Windows XP VM. The crash that will be h.264/aac/mp4 files. from the computer? occurs at the point where the There are specific settings http://goo.gl/VduRpd Windows Logo appears on boot-up. Q I'm selling an Acer Revo required for Apple stuff to work. I tried using F1 2 and booting from Aspire. It has only Ubuntu as Handbrake is a tool which should * Security risk in everyday use of the Windows 7 Installation CD but an operating system, but I want to be able to do it, and has presets an admin account (not root)? that crashed in the same way. I am delete all my personal info before just for Apple, but there will be a http://goo.gl/5iCKvm on Ubuntu 1 4.04. selling. loss of quality, as all transcoding loses qualify. * How to combine the output of (Thanks to ajgreeny and Download DBAN, burn it to a multiple `find` commands? A philchambers in the Ubuntu A CD, boot from it, run with the http://goo.gl/nNnY1 0 Forums) I have downloaded and defaults, which will probably take a couple of hours. If you want your * Format usb and confirm all zeros installed the latest VB from the VB TOP QUESTIONS AT site (5.0.1 0) and that has fixed buyer to have an operating system, http://goo.gl/1 63fXm things. do an "OEM" install of Ubuntu: ASKUBUNTU https://help.ubuntu.com/communi * Leaving old kernels installed ty/Ubuntu_OEM_Installer_Overvie * Can I convert hex to decimal could be dangerous? How to block emails in w using the calculator app? http://goo.gl/cVuI9z Q Thunderbird mail? I am http://goo.gl/i0i1 7n unsubscribing to as many mass

full circle magazine #1 04 43 contents ^ Q&A

TIPS AND TECHNIQUES WELL, DARN

didn't do anything interesting in I Linux this month. Professionally, I'm looking at Windows 1 0 with a view to a corporate rollout in the spring. It's an accounting shop. The typical computer has almost 200 "applications" installed, and none of them run under Linux. (A potential client walks in and says, "I haven't filed a tax return for 1 2 years, and I have income in both Canada and the United States." That's two dozen "applications" right there.)

At a personal level, my wife and One thing I have noticed in I are seeking legal custody of her Linux: Xubuntu 1 5.1 0 mounts my grandson, which requires quite a Android phone as an external lot of work. He's a very bright drive, which makes transferring eight-year-old who came from files back and forth much easier. China a year and a half ago. We're looking after him, but need legal standing to make educational and medical decisions on his behalf. Our house got a lot noisier when he arrived! Gord had a long career in the computer industry, then retired for My picture celebrates several years. More recently, he somehow found himself "The IT Guy" “Movember”. Look it up. at a 1 5-person accounting firm in downtown Toronto.

full circle magazine #1 04 44 contents ^ UT D O SOL

full circle magazine #1 04 45 contents ^ SSeeccuurriittyy UUssee VVeerraaCCrryypptt Written by Scott Kenney

or many years, TrueCrypt was this tutorial, we'll be downloading After this, we'll see a message empty container. The easiest thing F my encryption program of the latest version, 1 .1 3. about uninstall instructions. If you to do is to create one container, choice to encrypt my files on my ever want to uninstall VeraCrypt, put a password on it, and then computer. I liked how it worked on Once you have the file you'll use this command: mount your container. This is the both my Linux and Windows downloaded, extract it by either process that we'll walk through. systems. However, in May of 201 4, using right-click and “Extract veracrypt-uninstall.sh After that, we'll work on setting up TrueCrypt was discontinued, and Here”, or from the command-line a two-step system for better the last version to be released (7.2) by typing: Type in your root password at security. So to get started, click on only removed encryption for files the prompt, and press return. The the “create volume” button. and containers. tar xvf veracrypt-1.13- package will install several files, setup.tar.bz2 and once it's done, will direct you to press “enter” to exit the Since then the project was At this point you'll have four forked to the VeraCrypt program, terminal. To start the program, files extracted. Two are for a click on the home button and and this is the program that I'm console installation (32 and 64-bit), running today. search for “Vera”. The VeraCrypt and two are for GUI installation (32 program will be displayed. Click it and 64-bit). In this case, we'll use to get started! I use VeraCrypt to create the 32-bit GUI install. You can issue “containers”, which can be the command: mounted to the file system and files written to it. Then the sh veracrypt-1.13-setup-gui- container can be encrypted, and sit among your other files in plain sight. Only you will know that the Because we've already file is a container. This makes it extracted the package, go ahead easier to keep a small amount of and select 'Install VeraCrypt”. files encrypted, if you have no need for whole disk encryption. Next step is to read through the license terms. You can use the To get VeraCrypt installed on scroll bars on the left side to read your computer, head over to them, and once you are done, you Once the program starts, you'll https://veracrypt.codeplex.com/ can accept it at the bottom. be presented with several empty and download the source code. In slots. Our first task is to create an

full circle magazine #1 04 46 contents ^ SECURITY

For our tutorial, we'll create an the file, press Next. VeraCrypt will Now you'll be presented with mount the container and use it! Go encrypted file container, so select warn you that the file will be the format options of the back to the original screen with the the first option. Select “Standard replaced, but since we created the container. If you plan on using the 1 2 different slots, and this time VeraCrypt Volume” on the next file expressly for VeraCrypt, we're container only in Linux, you can click on “select file”. Navigate to screen. ok. choose the Ext4 file system. where you created your container, However if you want the container and select it. Once you have the Now you get to select which to be mounted in Windows also, correct file, click on a slot where kind of encryption you want. The select “FAT”. you want to mount the container, differences in the types of and select “mount” at the bottom. encryption are beyond the scope You'll enter the password you of this tutorial, so for our purposes created for the container at this we'll just select AES(Twofish) and point. VeraCrypt will then ask for select Next. your root password in order to mount it.

At this point, VeraCrypt wants you to select a file to make a container. You don't want to use an existing file, because it will be It’s time to encrypt the deleted and replaced with the container! By moving the mouse newly-created VeraCrypt file. So around, you'll increase the what you can do is create an empty Now you determine how big cryptographic strength of the text file, and call it whatever you you want to make your container. encryption keys. When you are want. For security purposes, don't We'll select a simple 500MB satisfied with the strength (or just call the file something obvious like container. After clicking next, you'll impatient), click Format to create “secret container”, but rather use choose the password you want for the container. You'll get one more an innocent-sounding name. In this the container. warning that the file already exists. Here we can see that our case, I created a text file named, Since we created the file for this 500MB container is mounted in “Ubuntu-1 4.04-install-inst.txt”. purpose, we can format it. slot 5 of VeraCrypt. Opening our Since I'm running 1 5.04, I know file manager of choice we can see that I will not need instructions to Once it's finished, you'll be that it is indeed mounted and install 1 4.04, but others will just presented with a dialog saying it ready for files. In this case, Dolphin see that file and assume it's an was successful. Now it's time to is reporting a new 499.8 MB hard older file. Once you've selected drive.

full circle magazine #1 04 47 contents ^ SECURITY To verify that you closed it not actually what the label says. If correctly, go back to your file the small container gets manager and see if it's there. compromised, all it will have is the complicated password, but not Indeed, it's dismounted, and no what it goes to. If you named your longer displays on the list of larger container in such a way that devices! it blends in with other files, others will have a tough time looking for So that's the basics of creating it. an encrypted file container. You can move the container anywhere That wraps up our VeraCrypt you want, it doesn't have to stay in tutorial, and should get you the directory where it was created. started in encrypting and hiding For better security, you might want your sensitive files. Remember When you are done with the to try creating a two-tier system. that longer passwords are better, container, you need to dismount What you can do is create a simple and don't accidentally delete your the drive, so it can close properly. 1 MB file with a simple password. containers thinking they are Simply click “Dismount” and Mount that container, and inside it something else! VeraCrypt will dismount the drive. create a text file. Open the text file, and insert a very complicated password and that's it. No reference to anything else. Save it, and dismount the container. Now create a container as big as you want, and use the complicated password (that you are storing on the text file in the 1 MB container) as the password to open it. In naming the bigger container, think how big you want it, and give it a filename that can blend in with Scott lives in Oklahoma, USA with his similar files. wife and four kids. He has been using Linux in one form or another since Store that container among the 201 0. His current preferred distro is Kubuntu 1 4.04. other files in that directory, and just remember it's a container, and

full circle magazine #1 04 48 contents ^ LLIINNUUXX LLOOOOPPBBAACCKK Written by S. J. Webb

joint research project The entire OS was rewritten in the the University of Illinois in 1 975. 1 992 ATT dissolved this A between the Massachusetts C program language. partnership and sold the UNIX Institute of Technology, Bell Labs From 1 975 to 1 980 Unix grew in trademark to Novell. UNIX has and General Electric ended in the The first computer running academic circles. There were shuffled owners a few times over 1 960s. This project was called UNIX was the PDP-7. UNIX was various UNIX variants, perhaps the the years. Multics. The last researchers on the used as a word processor for the most famous is BSD out of the project were Ken Thompson, Bell Labs patent office in 1 971 . The University of California Berkeley. Dennis Ritchie, M.D. McEllroy and success of UNIX in this fashion From 1 980 to 1 985 UNIX was J.F. Ossanna. These researchers allowed a PDP-1 1 to be purchased commercialized and adopted by would continue working the and further improvements to the the commercial world. SJ Webb is a Linux Hobbyist and base code. UNIX came to the public Research Coordinator. He enjoys Multics main end game: continuing fishing, hot rodding, and spending the work that became the base to in 1 974 based off a published In the late 1 980’s, Sun time with his kids and wife. He UNIX. This new OS started in 1 970. paper. The first license was sold to Microsystems and AT&T Labs thanks Mike Ferarri for his partnered to improve on UNIX. In mentorship.

full circle magazine #1 04 49 contents ^ UUBBUUNNTTUU GGAAMMEESS Link And Controller Written by Ronnie Tucker Steam Link And Controller

decided to take a gamble and You turn it on, turn your TV to It’s a nice interface. From here Once you choose a game you I buy a Steam Link and controller the appropriate channel and, after you can browse your library, the are greeted with a menu of options just after the initial first batch. It initial setup, you’re greeted by the Steam store, chat, and so on. down the left, and various bits of was a gamble as a lot of the games Steam Link screen to connect to info about the chosen game. in my Steam library are mouse your gaming PC. Once in your library, you can Selecting ‘Manage Game’ lets you and/or keyboard games. I knew browse through your games for choose a set of bindings for the that some just wouldn’t be suitable After selecting your PC the something to relax with. controller. (X-Plane 1 0), but I hoped that some Steam software (on your PC) will others (Euro Truck Simulator 2, go into Big Picture (aka: full Perfect Golf, etc) would be usable screen) mode. since the controller did seem to have pretty good key-mapping capabilities.

STEAM LINK

The Link is a small device, about the size of a pack of playing cards, Some bindings are supplied by which connects to your gaming the developer of the game, but, if device using either Wi-Fi or none are on offer, the community ethernet, and connects to your TV usually has at least one set of using an HDMI cable. bindings available.

It is good to have a choice of bindings. Of course, if you don’t like any of the settings on offer, you can create your own, or modify an existing setup.

So, yeah, the Steam Link definitely works. It streams your desktop screen to your TV.

full circle magazine #1 04 50 contents ^ UBUNTU GAMES sometimes when it does, it’s not Most games do, but some have STEAM CONTROLLER great. none – and you’re on your own there. The controller is actually quite So, some examples... nice. It has an analogue stick, and The Link is a good idea, and in the pad on the right acts like a Perfect Golf - Surely one of the hardware it works well, but, until laptop touchpad. Handy for mouse perfect games for the Link and the game developers get on board, games and such like. It has more controller! Yes, but the developer it’s a bit of a hit-and-hope thing. than enough buttons (four on the doesn’t recognise the controller as Even in the Steam software there’s front, four shoulder buttons, and Starbound - This one does work yet, so this game is unplayable. perfectly. No gripes here. The no way to know in advance, and for two grip buttons on the back) with sure, if a game is compatible with the inevitable Steam button slap developer provides a great set of Euro Truck Simulator 2 - Another key bindings. the Link/Controller. bang in the middle which will turn one that would be excellent on the the controller, and your Link, big screen, and in the comfort of on/off. Cities: Skylines - A PC mouse and your sofa. Well, this one does work! keyboard game if ever there was But at a price. Thus far, the only one, and the developer provides Updates can be sent to the way I’ve managed to get it playable controller via the supplied USB some good settings for it. I’m not is by setting the control interface saying it’s as good as, or better Here’s hoping it improves with cable. Steam will pop up with a (in game) to keyboard then binding age. window telling you an update is than, a mouse and keyboard, but the relevant keys to the controller it’s certainly playable. available. (or using an existing set of bindings and modifying them as Disclaimer: this review is very necessary). Fine for most things, CONCLUSION subjective. My taste in games but terrible for driving. Which is dictates as to how effective the what the game is about! Imagine So, you see, it’s a bit of a mixed Link/Controller is in practice. Your driving in ETS2 using the keyboard. bag. Maybe all your games will choice in games may make my Not pleasant. work great, and you’ll love the review completely void. Link, but, as it stands, I can’t see ARK - This one is marked as being how the Link is going to bring PC IN PRACTICE controller compatible, so that’s a gaming to the living room TV. good start! Well, it might work for The whole idea behind the most people, but for me, I get to Yes, it’s great to be able to get in there and configure the layout Ronnie is the founder and (still!) Steam Link is to get your PC games see it working perfect on the PC, editor of Full Circle. He's a part-time to exactly how you like it with in on the big (TV) screen. To an but on my TV screen I see some arts and crafts sort of guy, and now extent it does, but not always. And garbled green junk. depth controls, but, ideally, you an Arduino tinkerer. want some preconfigured settings.

full circle magazine #1 04 51 contents ^ PPAATTRROONNSS

PATRONS DONATIONS

Bill Berninghausen John Niendorf Jack McMahon Daniel Witzel Linda P Douglas Brown CHA CHA CHA CHANGES Remke Schuurmans Donald Altman Our admin went AWOL for months, and Norman Phillips Patrick Scango I had no idea if/when the site Tom Rausner Tony Wood would/wouldn’t get paid. Initially the Charles Battersby Paul Miller plan was to move the site and domain Tom Bell Colin McCubbin name to my hosting, but eventually I managed to track him down and get Oscar Rivera Randy Brinson the FCM domain name, and site hosting Alex Crabtree John Fromm transferred to me. Ray Spain Graham Driver Richard Underwood Chris Burmajster The new site is now up. HUGE thanks to Lucas Westermann (Mr. Command & Charles Anderson Steven McKee Conquer) for taking on the job of Ricardo Coalla Manuel Rey Garcia completely rebuilding the site, and Chris Giltnane Alejandro Carmona Ligeon scripts, from scratch, in his own time. William von Hagen siniša vidović The Patreon page that I’ve set up is to Glenn Heaton help me pay the domain and hosting Juan Ortiz Louis W Adams Jr fees. The yearly target was quickly Joe Gulizia reached thanks to those listed on this Kevin Raulins page. FCM is not going away. Don’t worry about that. Doug Bruce Pekka Niemi Several people have asked for a PayPal Rob Fitzgerald (single donation) option, so I’ve added Brian M Murray a button to the side of the site Roy Milner A big thank you to all those who’ve Brian Bogdan used Patreon and the PayPal button. Scott Mack It’s a big help. Dennis Mack John Helmers https://www.patreon.com/ fullcirclemagazine

full circle magazine #1 04 52 contents ^ Full Circle Team

HHOOWW TTOO CCOONNTTRRIIBBUUTTEE Editor - Ronnie Tucker [email protected] FCM#1 05 Webmaster - Lucas Westermann [email protected] FULL CIRCLE NEEDS YOU! Deadline: A magazine isn't a magazine without articles and Full Circle is no Sunday 1 0th Jan. 201 6. exception. We need your opinions, desktops, stories, how-to's, Release: reviews, and anything else you want to tell your fellow *buntu users. Friday 29th Jan. 201 6. Send your articles to: [email protected] Editing & Proofreading Mike Kennedy, Gord Campbell, Robert We are always looking for new articles to include in Full Circle. For help and advice Orsino, Josh Hertel, Bert Jerred, Jim please see the Official Full Circle Style Guide: http://url.fullcirclemagazine.org/75d471 Dyer and Emily Gonyer

Our thanks go to Canonical, the many Send your comments or Linux experiences to: [email protected] translation teams around the world Hardware/software reviews should be sent to: [email protected] and Thorsten Wilms for the FCM logo. Questions for Q&A should go to: [email protected] Desktop screens should be emailed to: [email protected] ... or you can visit our site via: fullcirclemagazine.org Getting Full Circle Magazine:

EPUB Format - Recent editions of Full Circle have a link to the epub file on the downloads page. If you have any problems with the epub file, you can drop an email to: [email protected]

Issuu - You can read Full Circle online via Issuu: http://issuu.com/fullcirclemagazine. Please share and rate FCM as it helps to spread the word about FCM and Ubuntu Linux.

Google Play - You can now read Full Circle on /Books. Either search for 'full circle magazine' or click this link: https://play.google.com/store/books/author?id=Ronnie+Tucker

full circle magazine #1 04 53 contents ^