diff --git a/sql/hpr-db-part-14.sql b/sql/hpr-db-part-14.sql
index 05cadd9..27ea3a9 100644
--- a/sql/hpr-db-part-14.sql
+++ b/sql/hpr-db-part-14.sql
@@ -588,7 +588,8 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti
(3997,'2023-11-28','The Oh No! News.',875,'Sgoti talks about Malware distributed via Google\'s Dynamic Ads and more.','
The Oh No! news.
\nOh No! News is Good\nNews.
\n\n- TAGS: Oh No, News, Threat analysis, InfoSec, Google\nDynamic Search Ads
\n
\n
\nThreat analysis;\nyour attack surface.
\n\n
\nInfoSec; the language\nof security.
\n\n
\n\n- Additional Information.\n
\n- What is a \"Data\nBreach\"? A data breach is a security violation, in which sensitive,\nprotected or confidential data is copied, transmitted, viewed, stolen,\naltered or used by an individual unauthorized to do so.
\n \n- What is \"Malware\"?\nMalware (a portmanteau for\nmalicious software) is any software intentionally designed to cause\ndisruption to a computer, server, client, or computer network, leak\nprivate information, gain unauthorized access to information or systems,\ndeprive access to information, or which unknowingly interferes with the\nuser\'s computer security and privacy.
\n \n- What is a \"Payload\"?\nIn the context of a computer virus or worm, the payload is the portion\nof the malware which performs malicious action; deleting data, sending\nspam or encrypting data. In addition to the payload, such malware also\ntypically has overhead code aimed at simply spreading itself, or\navoiding detection.
\n \n- What is \"Phishing\"?\nPhishing is a form of social engineering\nwhere attackers deceive people into revealing sensitive information or\ninstalling malware such as ransomware. Phishing\nattacks have become increasingly sophisticated and often transparently\nmirror the site being targeted, allowing the attacker to observe\neverything while the victim is navigating the site, and transverse any\nadditional security boundaries with the victim.
\n \n- Social\nengineering (security) In the context of information security,\nsocial engineering is the psychological\nmanipulation of people into performing actions or divulging\nconfidential information. A type of confidence trick for the purpose of\ninformation gathering, fraud, or system access, it differs from a\ntraditional \"con\" in that it is often one of many steps in a more\ncomplex fraud scheme.
\n \n- What is \"Information\nSecurity\" (InfoSec)? Information security, sometimes shortened to\nInfoSec, is the practice of protecting information by mitigating information risks. It\nis part of information risk\nmanagement.\n
\n- Information Security Attributes: Confidentiality, Integrity and Availability (C.I.A.).\nInformation Systems are composed in three main portions, hardware,\nsoftware and communications with the purpose to help identify and apply\ninformation security industry standards, as mechanisms of protection and\nprevention, at three levels or layers: physical, personal and\norganizational. Essentially, procedures or policies are implemented to\ntell administrators, users and operators how to use products to ensure\ninformation security within the organizations.
\n \n
\n- What is \"Risk\nmanagement\"? Risk management is the identification, evaluation, and\nprioritization of risks followed by coordinated and economical\napplication of resources to minimize, monitor, and control the\nprobability or impact of unfortunate events or to maximize the\nrealization of opportunities.
\n \n- What is a \"Vulnerability\"\n(computing)? Vulnerabilities are flaws in a computer system that\nweaken the overall security of the device/system. Vulnerabilities can be\nweaknesses in either the hardware itself, or the software that runs on\nthe hardware.
\n \n- What is an \"Attack\nSurface\"? The attack surface of a software environment is the sum of\nthe different points (for \"attack vectors\") where an unauthorized user\n(the \"attacker\") can try to enter data to or extract data from an\nenvironment. Keeping the attack surface as small as possible is a basic\nsecurity measure.
\n \n- What is an \"Attack\nVector\"? In computer security, an attack vector is a specific path,\nmethod, or scenario that can be exploited to break into an IT system,\nthus compromising its security. The term was derived from the\ncorresponding notion of vector in biology. An attack vector may be\nexploited manually, automatically, or through a combination of manual\nand automatic activity.
\n \n- What is\n\"Standardization\"? Standardization is the process of implementing\nand developing technical standards based on the consensus of different\nparties that include firms, users, interest groups, standards\norganizations and governments. Standardization can help maximize\ncompatibility, interoperability, safety, repeatability, or quality. It\ncan also facilitate a normalization of formerly custom processes.\n
\n- What is a \"Replay\nattack\"? A replay attack is a form of network attack in which valid\ndata transmission is maliciously or fraudulently repeated or delayed.\nAnother way of describing such an attack is: \"an attack on a security\nprotocol using a replay of messages from a different context into the\nintended (or original and expected) context, thereby fooling the honest\nparticipant(s) into thinking they have successfully completed the\nprotocol run.\"
\n \n- What is a\n\"Man-in-the-middle attack\"? In cryptography and computer security, a\nman-in-the-middle, ..., attack is a cyberattack where the attacker\nsecretly relays and possibly alters the communications between two\nparties who believe that they are directly communicating with each\nother, as the attacker has inserted themselves between the two\nparties.
\n \n- What is \"Transport Layer\nSecurity\" (TLS)? Transport Layer Security (TLS) is a cryptographic\nprotocol designed to provide communications security over a computer\nnetwork. The protocol is widely used in applications such as email,\ninstant messaging, and voice over IP, but its use in securing HTTPS\nremains the most publicly visible.
\n \n- What is a \"Handshake\"\n(computing)?. In computing, a handshake is a signal between two\ndevices or programs, used to, e.g., authenticate, coordinate. An example\nis the handshaking between a hypervisor and an application in a guest\nvirtual machine.
\n \n- What is Security\ntheater? The practice of taking security measures that are\nconsidered to provide the feeling of improved security while doing\nlittle or nothing to achieve it.
\n \n
\n
\n
\n\n',391,74,0,'CC-BY-SA','Oh No News, Threat analysis, InfoSec, Google Dynamic Search Ads',0,0,1),
(4005,'2023-12-08','Sgoti\'s reply to multiple shows.',893,'Sgoti replies to a few HPR Shows.','Sgoti\'s reply to multiple\nshows.
\nSgoti replies to a few HPR\nShows.
\n\nThis work is licensed under a Creative Commons\nAttribution-ShareAlike 4.0 International License.
\n',391,0,0,'CC-BY-SA','reply show, password managers, lastpass',0,0,1),
(3998,'2023-11-29','Using open source OCR to digitize my mom\'s book',1847,'How I used open source tools such as gphoto2 and the OCR software tesseract to digitize pages','To improve the speed of my workflow, I wrote a bash script that uses\nthe open source programs programs gphoto2
,\ntesseract
, grep
and ImageMagick
\nto digitize my mom\'s 338 page book. Here is the link to the script:\nhttps://github.com/deltaray/ocr-script
\n',194,0,0,'CC-BY-SA','ocr,opensource,grep,scripts,programming',0,0,1),
-(4002,'2023-12-05','Today I learnt - 2023-11-24',477,'Some odds and ends I learnt today','\nWhat\'s this?
\nI enjoy finding out about things. Now I\'m retired (I have been for 14\nyears), I have time to research subjects I find interesting. So I\ndo!
\nThe HPR project is going through a phase where the queue can get very\nlow, so I thought having a subject where I could fire off short shows\nfrom time to time would help with this. Maybe we can make a series where\nothers who like the idea can contribute when the mood takes them!
\nMy plan is to keep details to a minimum and provide links to sources\nof more information if you\'re someone who likes to dig deeper!
\nTIL 1 - is it learnt\nor learned?
\nI discovered that both are acceptable. Both are the past tense (and\npast participle) of the verb \"to learn\":
\n\n- learnt is an older form which is more common in British\nEnglish
\n- learned is more common in US English, and is becoming more\npopular in the UK
\n
\nLinks
\n\nTIL 2 - the French word\nfor piggy bank
\nI watch a YouTube channel from a Canadian woodworker who produces\nEnglish and French versions of his episodes. His latest one is about\nmaking a wooden piggy bank, or tirelire in French.
\nI learnt French at school (though I wasn\'t much good at it), but have\nnever come across this word. My questions are:
\n\n- Where does it come from?
\n- How do you say it?
\n
\nThe Wiktionary page below has answers to both.
\n\n- It\'s of onomatopoeic origin (representing the rattling of\ncoins).
\n- There\'s audio on the page showing how to say it (as well as the IPA\nversion [International Phonetic Alphabet], see below).
\n
\nLinks
\n\nTIL 3 - how to\npronounce IPA coded words
\nI actually learnt about this a while ago, but I thought now would be\na good time to share.
\nThe IPA form of tirelire is /tiʁ.liʁ/
(I\nincluded the enclosing slash delimiters which aren\'t part of the IPA but\nhave significance; see the IPA Wikipedia page for details). I have seen\nthese symbols for years but have never managed to decode them\nreliably.
\nA few months ago I wondered how to deal with them reliably (and\neasily). There are many sites offering to transcribe English (and other\nlanguages) to IPA, a few of which are free. I only found one that would\nattempt to speak IPA, and that is IPA\nReader.
\nPaste the IPA into the form, select a reader voice, and click \"Read\".\nSome of the voices seem a bit odd. I settled on \"Brian\" for British\nEnglish, and it seems fine.
\nLinks
\n\n\n',225,0,1,'CC-BY-SA','learning,learned,learnt,TIL,English,French,phonetics,IPA,tirelire',0,0,1);
+(4002,'2023-12-05','Today I learnt - 2023-11-24',477,'Some odds and ends I learnt today','\nWhat\'s this?
\nI enjoy finding out about things. Now I\'m retired (I have been for 14\nyears), I have time to research subjects I find interesting. So I\ndo!
\nThe HPR project is going through a phase where the queue can get very\nlow, so I thought having a subject where I could fire off short shows\nfrom time to time would help with this. Maybe we can make a series where\nothers who like the idea can contribute when the mood takes them!
\nMy plan is to keep details to a minimum and provide links to sources\nof more information if you\'re someone who likes to dig deeper!
\nTIL 1 - is it learnt\nor learned?
\nI discovered that both are acceptable. Both are the past tense (and\npast participle) of the verb \"to learn\":
\n\n- learnt is an older form which is more common in British\nEnglish
\n- learned is more common in US English, and is becoming more\npopular in the UK
\n
\nLinks
\n\nTIL 2 - the French word\nfor piggy bank
\nI watch a YouTube channel from a Canadian woodworker who produces\nEnglish and French versions of his episodes. His latest one is about\nmaking a wooden piggy bank, or tirelire in French.
\nI learnt French at school (though I wasn\'t much good at it), but have\nnever come across this word. My questions are:
\n\n- Where does it come from?
\n- How do you say it?
\n
\nThe Wiktionary page below has answers to both.
\n\n- It\'s of onomatopoeic origin (representing the rattling of\ncoins).
\n- There\'s audio on the page showing how to say it (as well as the IPA\nversion [International Phonetic Alphabet], see below).
\n
\nLinks
\n\nTIL 3 - how to\npronounce IPA coded words
\nI actually learnt about this a while ago, but I thought now would be\na good time to share.
\nThe IPA form of tirelire is /tiʁ.liʁ/
(I\nincluded the enclosing slash delimiters which aren\'t part of the IPA but\nhave significance; see the IPA Wikipedia page for details). I have seen\nthese symbols for years but have never managed to decode them\nreliably.
\nA few months ago I wondered how to deal with them reliably (and\neasily). There are many sites offering to transcribe English (and other\nlanguages) to IPA, a few of which are free. I only found one that would\nattempt to speak IPA, and that is IPA\nReader.
\nPaste the IPA into the form, select a reader voice, and click \"Read\".\nSome of the voices seem a bit odd. I settled on \"Brian\" for British\nEnglish, and it seems fine.
\nLinks
\n\n\n',225,0,1,'CC-BY-SA','learning,learned,learnt,TIL,English,French,phonetics,IPA,tirelire',0,0,1),
+(4004,'2023-12-07','Wayland to X11 bridge',285,'Ken found out about x prop and x wayland video bridge','After a strange unnamed window appeared on my desktop, I used\nxprop
to identify it and a search lead me to\nxwaylandvideobridge
.
\nFrom the man page of
\n\nxprop - property displayer for X
\nSUMMARY
\nThe xprop utility is for displaying window and font properties in an X\nserver. One window or font is selected using the command line arguments\nor possibly in the case of a window, by clicking on the desired window.\nA list of properties is then given, possibly with formatting\ninformation.
\n
\nFrom GitHub KDE\n/ xwaylandvideobridge
\n\nAbout
\nBy design, X11 applications can\'t access window or screen contents\nfor wayland clients. This is fine in principle, but it breaks screen\nsharing in tools like Discord, MS Teams, Skype, etc and more.
\nThis tool allows us to share specific windows to X11 clients, but\nwithin the control of the user at all times.
\nHow to use
\nxwaylandvideobridge should autostart on login. It will run in the\nbackground. Next time you try to share a window a prompt will appear.\nThe previously selected window should now be available for sharing. The\ntitle will always be \"Wayland to X11 bridge\" no matter what window is\nselected.
\nThe system tray icon provides finer control.
\n
\n',30,0,0,'CC-BY-SA','TodayILearned, xprop, XwaylandVideoBridge',0,0,0);
/*!40000 ALTER TABLE `eps` ENABLE KEYS */;
UNLOCK TABLES;
@@ -997,4 +998,3 @@ INSERT INTO `hosts` (`hostid`, `host`, `email`, `profile`, `license`, `local_ima
(392,'timttmy','marshall.cleave.nospam@nospam.tiscali.co.uk','\r\nPlease contact me on my pleroma account @timttmy@the-pit.uk
','CC-BY-SA',0,'',1,'timttmy'),
(393,'Anonymous Host','Anonymous.Host.nospam@nospam.hackerpublicradio.org','A catch all account for those who wish to submit content anonymously.','CC-BY-SA',0,'',1,'Anonymous Host'),
(394,'Trey','jttrey3.nospam@nospam.yahoo.com','','CC-BY-SA',0,'',1,'Trey'),
-(395,'CoGo','cogocogocogocogo.nospam@nospam.gmail.com','\r\nBorn Again Christian
\r\nCNC hobbyist, worker
\r\nLove but can\'t afford aviation.\r\n
','CC-BY-SA',0,'',1,'Co Go'),
diff --git a/sql/hpr-db-part-15.sql b/sql/hpr-db-part-15.sql
index 690635a..812d2c4 100644
--- a/sql/hpr-db-part-15.sql
+++ b/sql/hpr-db-part-15.sql
@@ -1,3 +1,4 @@
+(395,'CoGo','cogocogocogocogo.nospam@nospam.gmail.com','\r\nBorn Again Christian
\r\nCNC hobbyist, worker
\r\nLove but can\'t afford aviation.\r\n
','CC-BY-SA',0,'',1,'Co Go'),
(396,'BlacKernel','izzyleibowitz.nospam@nospam.pm.me','\r\nName: Izzy Leibowitz \r\nHandle: BlacKernel
\r\n
\r\nBio
\r\nI was born at a very young age and, from there, the rest is history.
\r\nIt\'s not a skill set, it\'s a compultion.
\r\nJust your average korn kob on the internet; strangely not using ksh.
\r\nSystem Fetch
\r\n\r\nPrefered Pronouns: Any (He/She/They/It/Your Majesty/Feared Ruler of the Forbidden Languages/etc)
\r\nPrefered Languages: Rust (compuled), Lua (scripting), Fish (shell scripting)
\r\nPrefered Shell: fish
\r\nPrefered OS: Slackware
\r\nPrefered DE: -XFCE- KDE (you guys were right after all)
\r\n
\r\nOther Projects
\r\n\r\nSCP Foundation: Dr. Izzy Leibowitz
\r\nContact Me
\r\n\r\nEmail: izzyleibowitz at pm dot me \r\nMastodon: at blackernel at nixnet dot social\r\n
','CC-BY-SA',0,'',1,'Black Kernel'),
(397,'hakerdefo','forever.jekyll.nospam@nospam.disroot.org','','CC-BY-SA',0,'',1,'haker de fo'),
(398,'one_of_spoons','hpr.nospam@nospam.spoons.one','Mastodon, though very rarely:
\r\n@one_of_spoons@hispagatos.space\r\n
','CC-BY-SA',0,'',1,'one of spoons'),
@@ -512,4 +513,4 @@ UNLOCK TABLES;
/*!40014 SET UNIQUE_CHECKS=@OLD_UNIQUE_CHECKS */;
/*!40111 SET SQL_NOTES=@OLD_SQL_NOTES */;
--- Dump completed on 2023-11-27 7:30:51
+-- Dump completed on 2023-11-28 16:10:05
diff --git a/sql/hpr.sql b/sql/hpr.sql
index b90d676..70cf0d2 100644
--- a/sql/hpr.sql
+++ b/sql/hpr.sql
@@ -20588,7 +20588,8 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti
(3997,'2023-11-28','The Oh No! News.',875,'Sgoti talks about Malware distributed via Google\'s Dynamic Ads and more.','The Oh No! news.
\nOh No! News is Good\nNews.
\n\n- TAGS: Oh No, News, Threat analysis, InfoSec, Google\nDynamic Search Ads
\n
\n
\nThreat analysis;\nyour attack surface.
\n\n
\nInfoSec; the language\nof security.
\n\n
\n\n- Additional Information.\n
\n- What is a \"Data\nBreach\"? A data breach is a security violation, in which sensitive,\nprotected or confidential data is copied, transmitted, viewed, stolen,\naltered or used by an individual unauthorized to do so.
\n \n- What is \"Malware\"?\nMalware (a portmanteau for\nmalicious software) is any software intentionally designed to cause\ndisruption to a computer, server, client, or computer network, leak\nprivate information, gain unauthorized access to information or systems,\ndeprive access to information, or which unknowingly interferes with the\nuser\'s computer security and privacy.
\n \n- What is a \"Payload\"?\nIn the context of a computer virus or worm, the payload is the portion\nof the malware which performs malicious action; deleting data, sending\nspam or encrypting data. In addition to the payload, such malware also\ntypically has overhead code aimed at simply spreading itself, or\navoiding detection.
\n \n- What is \"Phishing\"?\nPhishing is a form of social engineering\nwhere attackers deceive people into revealing sensitive information or\ninstalling malware such as ransomware. Phishing\nattacks have become increasingly sophisticated and often transparently\nmirror the site being targeted, allowing the attacker to observe\neverything while the victim is navigating the site, and transverse any\nadditional security boundaries with the victim.
\n \n- Social\nengineering (security) In the context of information security,\nsocial engineering is the psychological\nmanipulation of people into performing actions or divulging\nconfidential information. A type of confidence trick for the purpose of\ninformation gathering, fraud, or system access, it differs from a\ntraditional \"con\" in that it is often one of many steps in a more\ncomplex fraud scheme.
\n \n- What is \"Information\nSecurity\" (InfoSec)? Information security, sometimes shortened to\nInfoSec, is the practice of protecting information by mitigating information risks. It\nis part of information risk\nmanagement.\n
\n- Information Security Attributes: Confidentiality, Integrity and Availability (C.I.A.).\nInformation Systems are composed in three main portions, hardware,\nsoftware and communications with the purpose to help identify and apply\ninformation security industry standards, as mechanisms of protection and\nprevention, at three levels or layers: physical, personal and\norganizational. Essentially, procedures or policies are implemented to\ntell administrators, users and operators how to use products to ensure\ninformation security within the organizations.
\n \n
\n- What is \"Risk\nmanagement\"? Risk management is the identification, evaluation, and\nprioritization of risks followed by coordinated and economical\napplication of resources to minimize, monitor, and control the\nprobability or impact of unfortunate events or to maximize the\nrealization of opportunities.
\n \n- What is a \"Vulnerability\"\n(computing)? Vulnerabilities are flaws in a computer system that\nweaken the overall security of the device/system. Vulnerabilities can be\nweaknesses in either the hardware itself, or the software that runs on\nthe hardware.
\n \n- What is an \"Attack\nSurface\"? The attack surface of a software environment is the sum of\nthe different points (for \"attack vectors\") where an unauthorized user\n(the \"attacker\") can try to enter data to or extract data from an\nenvironment. Keeping the attack surface as small as possible is a basic\nsecurity measure.
\n \n- What is an \"Attack\nVector\"? In computer security, an attack vector is a specific path,\nmethod, or scenario that can be exploited to break into an IT system,\nthus compromising its security. The term was derived from the\ncorresponding notion of vector in biology. An attack vector may be\nexploited manually, automatically, or through a combination of manual\nand automatic activity.
\n \n- What is\n\"Standardization\"? Standardization is the process of implementing\nand developing technical standards based on the consensus of different\nparties that include firms, users, interest groups, standards\norganizations and governments. Standardization can help maximize\ncompatibility, interoperability, safety, repeatability, or quality. It\ncan also facilitate a normalization of formerly custom processes.\n
\n- What is a \"Replay\nattack\"? A replay attack is a form of network attack in which valid\ndata transmission is maliciously or fraudulently repeated or delayed.\nAnother way of describing such an attack is: \"an attack on a security\nprotocol using a replay of messages from a different context into the\nintended (or original and expected) context, thereby fooling the honest\nparticipant(s) into thinking they have successfully completed the\nprotocol run.\"
\n \n- What is a\n\"Man-in-the-middle attack\"? In cryptography and computer security, a\nman-in-the-middle, ..., attack is a cyberattack where the attacker\nsecretly relays and possibly alters the communications between two\nparties who believe that they are directly communicating with each\nother, as the attacker has inserted themselves between the two\nparties.
\n \n- What is \"Transport Layer\nSecurity\" (TLS)? Transport Layer Security (TLS) is a cryptographic\nprotocol designed to provide communications security over a computer\nnetwork. The protocol is widely used in applications such as email,\ninstant messaging, and voice over IP, but its use in securing HTTPS\nremains the most publicly visible.
\n \n- What is a \"Handshake\"\n(computing)?. In computing, a handshake is a signal between two\ndevices or programs, used to, e.g., authenticate, coordinate. An example\nis the handshaking between a hypervisor and an application in a guest\nvirtual machine.
\n \n- What is Security\ntheater? The practice of taking security measures that are\nconsidered to provide the feeling of improved security while doing\nlittle or nothing to achieve it.
\n \n
\n
\n
\n\n',391,74,0,'CC-BY-SA','Oh No News, Threat analysis, InfoSec, Google Dynamic Search Ads',0,0,1),
(4005,'2023-12-08','Sgoti\'s reply to multiple shows.',893,'Sgoti replies to a few HPR Shows.','Sgoti\'s reply to multiple\nshows.
\nSgoti replies to a few HPR\nShows.
\n\nThis work is licensed under a Creative Commons\nAttribution-ShareAlike 4.0 International License.
\n',391,0,0,'CC-BY-SA','reply show, password managers, lastpass',0,0,1),
(3998,'2023-11-29','Using open source OCR to digitize my mom\'s book',1847,'How I used open source tools such as gphoto2 and the OCR software tesseract to digitize pages','To improve the speed of my workflow, I wrote a bash script that uses\nthe open source programs programs gphoto2
,\ntesseract
, grep
and ImageMagick
\nto digitize my mom\'s 338 page book. Here is the link to the script:\nhttps://github.com/deltaray/ocr-script
\n',194,0,0,'CC-BY-SA','ocr,opensource,grep,scripts,programming',0,0,1),
-(4002,'2023-12-05','Today I learnt - 2023-11-24',477,'Some odds and ends I learnt today','\nWhat\'s this?
\nI enjoy finding out about things. Now I\'m retired (I have been for 14\nyears), I have time to research subjects I find interesting. So I\ndo!
\nThe HPR project is going through a phase where the queue can get very\nlow, so I thought having a subject where I could fire off short shows\nfrom time to time would help with this. Maybe we can make a series where\nothers who like the idea can contribute when the mood takes them!
\nMy plan is to keep details to a minimum and provide links to sources\nof more information if you\'re someone who likes to dig deeper!
\nTIL 1 - is it learnt\nor learned?
\nI discovered that both are acceptable. Both are the past tense (and\npast participle) of the verb \"to learn\":
\n\n- learnt is an older form which is more common in British\nEnglish
\n- learned is more common in US English, and is becoming more\npopular in the UK
\n
\nLinks
\n\nTIL 2 - the French word\nfor piggy bank
\nI watch a YouTube channel from a Canadian woodworker who produces\nEnglish and French versions of his episodes. His latest one is about\nmaking a wooden piggy bank, or tirelire in French.
\nI learnt French at school (though I wasn\'t much good at it), but have\nnever come across this word. My questions are:
\n\n- Where does it come from?
\n- How do you say it?
\n
\nThe Wiktionary page below has answers to both.
\n\n- It\'s of onomatopoeic origin (representing the rattling of\ncoins).
\n- There\'s audio on the page showing how to say it (as well as the IPA\nversion [International Phonetic Alphabet], see below).
\n
\nLinks
\n\nTIL 3 - how to\npronounce IPA coded words
\nI actually learnt about this a while ago, but I thought now would be\na good time to share.
\nThe IPA form of tirelire is /tiʁ.liʁ/
(I\nincluded the enclosing slash delimiters which aren\'t part of the IPA but\nhave significance; see the IPA Wikipedia page for details). I have seen\nthese symbols for years but have never managed to decode them\nreliably.
\nA few months ago I wondered how to deal with them reliably (and\neasily). There are many sites offering to transcribe English (and other\nlanguages) to IPA, a few of which are free. I only found one that would\nattempt to speak IPA, and that is IPA\nReader.
\nPaste the IPA into the form, select a reader voice, and click \"Read\".\nSome of the voices seem a bit odd. I settled on \"Brian\" for British\nEnglish, and it seems fine.
\nLinks
\n\n\n',225,0,1,'CC-BY-SA','learning,learned,learnt,TIL,English,French,phonetics,IPA,tirelire',0,0,1);
+(4002,'2023-12-05','Today I learnt - 2023-11-24',477,'Some odds and ends I learnt today','\nWhat\'s this?
\nI enjoy finding out about things. Now I\'m retired (I have been for 14\nyears), I have time to research subjects I find interesting. So I\ndo!
\nThe HPR project is going through a phase where the queue can get very\nlow, so I thought having a subject where I could fire off short shows\nfrom time to time would help with this. Maybe we can make a series where\nothers who like the idea can contribute when the mood takes them!
\nMy plan is to keep details to a minimum and provide links to sources\nof more information if you\'re someone who likes to dig deeper!
\nTIL 1 - is it learnt\nor learned?
\nI discovered that both are acceptable. Both are the past tense (and\npast participle) of the verb \"to learn\":
\n\n- learnt is an older form which is more common in British\nEnglish
\n- learned is more common in US English, and is becoming more\npopular in the UK
\n
\nLinks
\n\nTIL 2 - the French word\nfor piggy bank
\nI watch a YouTube channel from a Canadian woodworker who produces\nEnglish and French versions of his episodes. His latest one is about\nmaking a wooden piggy bank, or tirelire in French.
\nI learnt French at school (though I wasn\'t much good at it), but have\nnever come across this word. My questions are:
\n\n- Where does it come from?
\n- How do you say it?
\n
\nThe Wiktionary page below has answers to both.
\n\n- It\'s of onomatopoeic origin (representing the rattling of\ncoins).
\n- There\'s audio on the page showing how to say it (as well as the IPA\nversion [International Phonetic Alphabet], see below).
\n
\nLinks
\n\nTIL 3 - how to\npronounce IPA coded words
\nI actually learnt about this a while ago, but I thought now would be\na good time to share.
\nThe IPA form of tirelire is /tiʁ.liʁ/
(I\nincluded the enclosing slash delimiters which aren\'t part of the IPA but\nhave significance; see the IPA Wikipedia page for details). I have seen\nthese symbols for years but have never managed to decode them\nreliably.
\nA few months ago I wondered how to deal with them reliably (and\neasily). There are many sites offering to transcribe English (and other\nlanguages) to IPA, a few of which are free. I only found one that would\nattempt to speak IPA, and that is IPA\nReader.
\nPaste the IPA into the form, select a reader voice, and click \"Read\".\nSome of the voices seem a bit odd. I settled on \"Brian\" for British\nEnglish, and it seems fine.
\nLinks
\n\n\n',225,0,1,'CC-BY-SA','learning,learned,learnt,TIL,English,French,phonetics,IPA,tirelire',0,0,1),
+(4004,'2023-12-07','Wayland to X11 bridge',285,'Ken found out about x prop and x wayland video bridge','After a strange unnamed window appeared on my desktop, I used\nxprop
to identify it and a search lead me to\nxwaylandvideobridge
.
\nFrom the man page of
\n\nxprop - property displayer for X
\nSUMMARY
\nThe xprop utility is for displaying window and font properties in an X\nserver. One window or font is selected using the command line arguments\nor possibly in the case of a window, by clicking on the desired window.\nA list of properties is then given, possibly with formatting\ninformation.
\n
\nFrom GitHub KDE\n/ xwaylandvideobridge
\n\nAbout
\nBy design, X11 applications can\'t access window or screen contents\nfor wayland clients. This is fine in principle, but it breaks screen\nsharing in tools like Discord, MS Teams, Skype, etc and more.
\nThis tool allows us to share specific windows to X11 clients, but\nwithin the control of the user at all times.
\nHow to use
\nxwaylandvideobridge should autostart on login. It will run in the\nbackground. Next time you try to share a window a prompt will appear.\nThe previously selected window should now be available for sharing. The\ntitle will always be \"Wayland to X11 bridge\" no matter what window is\nselected.
\nThe system tray icon provides finer control.
\n
\n',30,0,0,'CC-BY-SA','TodayILearned, xprop, XwaylandVideoBridge',0,0,0);
/*!40000 ALTER TABLE `eps` ENABLE KEYS */;
UNLOCK TABLES;
@@ -21512,4 +21513,4 @@ UNLOCK TABLES;
/*!40014 SET UNIQUE_CHECKS=@OLD_UNIQUE_CHECKS */;
/*!40111 SET SQL_NOTES=@OLD_SQL_NOTES */;
--- Dump completed on 2023-11-27 7:30:51
+-- Dump completed on 2023-11-28 16:10:05