Monthly Archives: October 2018

How To Run SpeedTest From The Linux Terminal

How To Run SpeedTest From The Linux Terminal

Introducing Speedtest-cli: it’s a command-line utility that lets you run Speedtest from the Linux terminal. It does everything that the Speedtest website does but with Linux command arguments. To install this software, you’ll need the latest version of the Python programming language.

Install Speedtest-cli

Speedtest-Cli is installable via many different Linux distribution’s software sources. It is also available via the source code or the Python Package tool.


sudo apt install speedtest-cli


sudo apt-get install speedtest-cli

Arch Linux

Arch users looking to install Speedtest-cli will need to first enable the “Community” software repository in /etc/pacman.conf. To activate, launch a terminal and open pacman.conf with Nano.

sudo nano /etc/pacman.conf

Scroll down and find “Community.” Remove all instances of # from in front of “Community,” and the lines underneath it as well. After removing the # symbols, press Ctrl + O to save the edits, and exit Nano with Ctrl + X.

Re-sync your Pacman to enable the Community repo.

sudo pacman -Syy

With the Community rep now up and running on your Arch Linux PC, install the speedtest-cli utility.

sudo pacman -S speedtest-cli


sudo dnf install speedtest-cli -y


sudo zypper install speedtest-cli

Generic Linuxes Via Python PIP

If you can’t get the Speedtest-cli utility, you’ll be able to get it going with Python and PIP. To start the installation, open up a terminal window and ensure you have the latest version of both Python and Pip. When you’ve determined you have the newest version of Python and Pip working on your Linux PC, install Speedtest-cli with the following command.

Note: do not try to use sudo during the installation, as it will mess up your Python development environment.

pip install speedtest-cli

Generic Linuxes via building from source

Going the Python Pip route on generic Linux distributions is usually the easiest way to get it going if your Linux distribution doesn’t care the software. However, if PIP doesn’t work, there’s another solution: building from source.

Before installing Speedtest-cli via the Github source code, install the Python programming language, as well as the Git tool. Then, use the git clone command to grab the code.

git clone

Move your terminal into the speedtest-cli code folder and update the contents’ permissions.

sudo chmod +x *

Run the installation tool to get Speedtest-cli working on your Linux PC.

python install

Use Speedtest-Cli

To run a basic internet speed test with the Speedtest-cli tool, launch a terminal, and run speedtest-cli in it. What follows is a basic test of your ping, upload, and download speed. The results of your internet test will show up in text form when the process is complete.


If you’re new to using the terminal and wish internet test results were easier to read, add the simple modifier to speedtest-clicommands.

speedtest-cli  --simple

Download-only Test

Want to figure out your download speed but don’t feel like running a full internet speed test? Try running the speedtest-cli command with the no-upload modifier.

speedtest-cli --no-upload

Combine no-upload with the simple modifier for an easy to read experience.

speedtest-cli --no-upload --simple

Upload-only Test

Running speedtest-cli with the no-download command will allow the user to do an “upload only” test.

speedtest-cli --no-download

For best results, run with the simple modifier.

speedtest-cli --no-download --simple

View Graphical Results

When you run an internet speed test on, you have the option of viewing your network results in a PNG image. If you want a picture result of speed tests you run with speedtest-cli in the terminal, add the share modifier.

speedtest-cli --share --simple

Speedtest With Bytes

Each internet test you run with the speedtest-cli command is measured in bits. It’s the universal standard for measuring speed on the internet. If this doesn’t sit right with you, consider using the bytes modifier in your tests.

speedtest-cli --bytes

Export SpeedTest To CSV

Do you run speed tests a lot? Want to keep track of your data? Consider running the speedtest-cli command with the csvmodifier. Using this feature prints out test results in the “csv” text format which is easily pasteable in spreadsheet programs like Microsoft Excel or Libre Office Calc.

speedtest-cli --csv

Other Speedtest-cli Features

In this tutorial, we go over many different useful features that you can use with speedtest-cli. Though, there are many other useful features that we haven’t covered.

To access the other Speedtest command-line features, run the following command in a terminal window.

speedtest-cli --help

Alternatively, save the help page to a text file with:

speedtest-cli --help >> ~/Documents/speedtest-cli-commands.txt
Ads by

Source: How To Run SpeedTest From The Linux Terminal

Categories: Uncategorized

Japanese temples aim to attract younger visitors with disco balls and planetarium shows

Buddhist temples in western Japan are becoming unlikely sites for entertainment, putting on 1970s and ’80s disco music and planetarium shows to attract young people and regain their status as places for community gatherings.

On a recent weeknight a huge glitter ball spun while emitting a bright white light on the ceiling of Kosenji temple in central Fukuoka.

Together with a pair of glitter balls on the floor flashing red, blue and purple lights, a discolike atmosphere was created inside the otherwise solemn main hall. It was an innovative effort by chief priest Koji Jo, 55, to get people in his community thinking of temples as part of secular life.

“Things have changed from the days when people would attend temple schools to learn writing. People don’t come to temples unless there is a funeral or other memorial service,” Jo said.

Source: As fewer people visit, Japanese temples aim to attract younger visitors with disco balls and planetarium shows | The Japan Times

Categories: Uncategorized

The military’s obsession with energy drinks is contributing to PTSD, study finds

Getting adequate sleep is increasingly rare among the active duty military population, as frequent deviations from the body’s natural circadian rhythms due to a demanding operational tempo pit personnel in an ongoing struggle against the ever-persistent sandman.

To combat the sleep deprivation unique to this demographic, service members often turn to energy drinks, a prominent component of combat deployments that has become as paramount to mission success as any piece of protective gear or weaponry.

The prevalence of energy drink use in these settings is extraordinary. The life blood is virtually everywhere — and tends to cost nothing — resulting in an environment in which nearly half of deployed troops down at least one readily available crack can per day.

But while consuming these drinks may not hurt service members in their wallets, excessive use may very well be contributing to long-term mental and physical ailments, a recent study in the Military Medicine journal observed.

The authors of the study surveyed over 600 male infantry soldiers during a post-deployment period after the brigade combat team returned from a 12-month combat deployment to Afghanistan. Questions were designed to examine the association of energy drink use with sleep deprivation or insomnia, depression, anxiety, post-traumatic stress disorder, alcohol abuse, aggressive behaviors and fatigue.

Source: The military’s obsession with energy drinks is contributing to PTSD, study finds

Categories: Uncategorized

Cow Cuddling Is The New Wellness Trend Now And It Costs $300 For A 90-Minute Session

Ever thought of snuggling up with a 1,000 lb farm animal to help with your mental health? No? Neither have I. But, if the sound of that intrigues you, you’re in luck. Because as it turns out, ‘cow cuddling’ might be the hottest new wellness trend. It’ll set you back a few bills, but could it be worth it?

Photo: Buure TV screengrab

According to PubMed, there is proof that humans can decrease their stress levels by interacting with animals. How one may choose to go about that is their own preference. While this concept, in particular, might sound a little strange, the new therapy trend falls in line with other programs we’ve seen in the past. Remember goat yoga? Or cat yoga? What about bunny yoga? While yoga with a cow might be a little tricky, cuddling with them might be the next best thing.

Mountain Horse Farm in upstate New York has a program offering the ‘Horse & Cow Experience’ where individuals can spend time connecting with the large barnyard animals. You can interact with them however you want to by petting, brushing or playing. If you’re not in the mood to play with the animals, you can simply cuddle with them. “Cows have a body temperature that is slightly higher than humans and their heart rate is lower than ours. Cuddling up with a cow, feeling that lower heart rate and higher body temperature, is very relaxing,” Mountain Horse Farm wrote on their website.

Source: Cow Cuddling Is The New Wellness Trend Now And It Costs $300 For A 90-Minute Session

Categories: Uncategorized

Tennessee doctor borrowed $300K from a patient, then diagnosed her with dementia

Dr. Suellen Lee, of Columbia, borrowed money from a longtime patient, then diagnosed that patient with dementia with no testing or second opinion.

A Tennessee doctor has retired her medical license after it was discovered that she borrowed a hefty loan from a longtime patient, then diagnosed the woman with dementia when she asked for her money back, according to state discipline records.

But the doctor now insists she was “set up” by a vindictive patient, and said she only agreed to retire after state attorneys presented her with an unwinnable legal case.

“It was all lies and I was told that if I fought it would be extremely costly to me,” said Dr. Suellen Lee on Tuesday. “And there would still be no benefit. There was no chance of reversal.”

Lee, 79, an internal medicine specialist in Columbia, retired her license last month in a peculiar case before the Tennessee Board of Medical Examiners, which is responsible for disciplining doctors throughout the state. Government attorneys said Lee borrowed $300,000 from a patient when her medical clinic fell on hard times, and when the patient later requested repayment, Lee diagnosed her with dementia in an apparent effort to escape the debt.

Source: Tennessee doctor borrowed $300K from a patient, then diagnosed her with dementia

Categories: Uncategorized

In Groundbreaking Decision, Feds Say Hacking DRM to Fix Your Electronics Is Legal

The new exemptions are a major win for the right to repair movement and give consumers wide latitude to legally repair the devices they own.

The Librarian of Congress and US Copyright Office just proposed new rules that will give consumers and independent repair experts wide latitude to legally hack embedded software on their devices in order to repair or maintain them. This exemption to copyright law will apply to smartphones, tractors, cars, smart home appliances, and many other devices.

The move is a landmark win for the “right to repair” movement; essentially, the federal government has ruled that consumers and repair professionals have the right to legally hack the firmware of “lawfully acquired” devices for the “maintenance” and “repair” of that device. Previously, it was legal to hack tractor firmware for the purposes of repair; it is now legal to hack many consumer electronics.

Specifically, it allows breaking digital rights management (DRM) and embedded software locks for “the maintenance of a device or system … in order to make it work in accordance with its original specifications” or for “the repair of a device or system … to a state of working in accordance with its original specifications.”

continue: In Groundbreaking Decision, Feds Say Hacking DRM to Fix Your Electronics Is Legal

Categories: Uncategorized

I Bought Used Voting Machines on eBay for $100 Apiece. What I Found Was Alarming

Opinion: The fact that voter information is left on devices, unencrypted, that are then sold on the open market is malpractice.

IN 2016, I bought two voting machines online for less than $100 apiece. I didn’t even have to search the dark web. I found them on eBay.

Surely, I thought, these machines would have strict guidelines for lifecycle control like other sensitive equipment, like medical devices. I was wrong. I was able to purchase a pair of direct-recording electronic voting machines and have them delivered to my home in just a few days. I did this again just a few months ago. Alarmingly, they are still available to buy online.

If getting voting machines delivered to my door was shockingly easy, getting inside them proved to be simpler still. The tamper-proof screws didn’t work, all the computing equipment was still intact, and the hard drives had not been wiped. The information I found on the drives, including candidates, precincts, and the number of votes cast on the machine, were not encrypted. Worse, the “Property Of” government labels were still attached, meaning someone had sold government property filled with voter information and location data online, at a low cost, with no consequences. It would be the equivalent of buying a surplus police car with the logos still on it.

continue: I Bought Used Voting Machines on eBay for $100 Apiece. What I Found Was Alarming

Categories: Uncategorized

An anonymous 4chan post could help solve a 25-year-old math mystery

An anime math problem

A 4chan poster may have solved part of a very tricky math problem that mathematicians have been working on for at least 25 years. The user was just trying to figure out the most efficient way to watch episodes of a nonlinear anime series, but the result has generated considerable interest from mathematicians around the world who have no way to identify the anonymous user.

Yesterday, Robin Houston, a computer scientist and mathematician tweeted about the bizarre intersection of 4chan and mathematics, inadvertently setting off a wave of public interest in the story. Within hours of his tweet, his phone was vibrating constantly. “It started to go mad,” he says. “My phone started going crazy.”

The 4chan part of this saga began on September 17th, 2011, when a poster posed a question: if you wanted to watch 14 episodes of the anime The Melancholy of Haruhi Suzumiya in every possible order, what’s the shortest string of episodes you’d need to watch?

There are 14 episodes in the first season of Haruhi, a 2006 anime based on a series of Japanese light novels. The episodes, which feature time travel and are otherwise chronologically challenging for the viewer, originally aired in a nonlinear order. When the series went to DVD, the episodes were rearranged, and it’s become something of an obsession for fans to rewatch the series over and over again, going through as many chronologies as possible.

An anonymous poster figured out one possible way to solve to the 4chan problem, satisfying the more mathematically inclined Haruhi fans. But in the process, they also helped puzzle out an issue that mathematicians have been working on since 1993. The anonymously authored proof (which was recently reposted on a Fandom wiki) is currently the most elegant solution to part of a mathematical problem involving something called superpermutations. It’s an enigma that goes well beyond anime.

In mathematics, a permutation is the order of a set of numbers. In anime terms, one permutation of Haruhi would be watching all 14 episodes in the order that they aired. But what if you’re a Haruhi superfan and watching the season once isn’t enough for you? In that case, you might be interested in a superpermutation, or all of the possible permutations of a set strung together. Think of it as the ultimate Haruhi marathon.

The branch of math that deals with permutations and superpermutations is called combinatorics. It doesn’t require years of study to be good at it, either. “It’s more accessible to amateur and casual mathematicians,” Houston says.

The poster’s anonymity doesn’t invalidate the solution for the mathematicians. “What’s beautiful about mathematics is that it’s a proof that starts with your hypothesis and leads to your conclusion,” Jay Pantone, a mathematician at Marquette University says. “You have to convince a skeptical reader that you’re correct. That doesn’t rely on your identity being known.”

continue: An anonymous 4chan post could help solve a 25-year-old math mystery

Categories: Uncategorized

Five Eyes Want to ‘Name and Shame’ by Exercising Absolute Power Over the Internet

It’s becoming all too clear where the global censorship effort is headed. With tech giants now a willing dongle to government, the infrastructure is in place to decide what is ‘foreign interference’ and who will be taken down next. Now, a legal framework to scale it out to the masses is being planned.

As seen earlier today in The Sydney Morning HeraldAustralia, Canada, New Zealand, Britain and the United States, also known as the ‘Five Eyes’ intelligence partners, want more access and authority to target Internet users that “sow discord, manipulate public discourse, bias the development of policy, or disrupt markets.” The article continues:

“Foreign interference threatens a nation’s sovereignty, values and national interests — it can limit or shape the polity’s ability to make independent judgements, erode public confidence in our political and government institutions, and interfere with private-sector decision making,” a joint communiqué read.

“While senior digital industry representatives did not accept our invitation to participate in discussions on pressing issues regarding the illicit use of online spaces, we reiterated the need for digital industry to take more responsibility for content promulgated and communicated through their platforms and applications.”

Source: Five Eyes Want to ‘Name and Shame’ by Exercising Absolute Power Over the Internet

Categories: Uncategorized

You should not drink human blood. It will not keep you young.

A recent study inspired headlines and tweets the likes of “drinking young people’s blood could help you live longer and prevent age-related diseases.” We at Popular Science would rather you not do that. Here are several arguments against drinking human blood.

Drinking human blood can make you very sick

For starters, a lot of blood you’ll encounter on the street carries some kind of pathogen. Drinking infected blood is a great way to get your very own infection. And unlike animals who’ve evolved to live on blood, humans can actually wind up with iron overdoses if they overindulge.

There are people feel compelled to drink the blood of others, and even follow rules to make sure they’re doing it safely and consensually. Some of the people who do this feel they have a genuine medical condition that is improved through the drinking of blood, but it’s important that you discuss these symptoms and feelings with your physician. And you definitely shouldn’t just take a shot of the first blood you’re offered.

Source: You should not drink human blood. It will not keep you young.

Categories: Uncategorized

Hacking Police Body Cameras

Categories: Uncategorized

What Is “Five Eyes” Surveillance? VPN Users, Beware!

If you’ve ever used a VPN, or are concerned about online privacy, you’ve probably stumbled across references to “Five Eyes,” “Nine Eyes,” and “14 Eyes.”

But what exactly do these surveillance alliances do? And can they affect the security of your VPN service?

What Is Five Eyes?

Five Eyes is a nickname for the United Kingdom–United States of America Agreement(UKUSA).

Despite the official name, UKUSA agreement consists of five countries. They are the UK, US, Canada, Australia, and New Zealand. The deal has its origins in a World War II intelligence-sharing agreement between Britain and America.

Five Eyes has given birth to many of the most notable privacy scandals in recent years, including PRISM, XKeyscore, and Tempora.

Today, its powers are scarily wide-ranging. According to the Electronic Frontier Foundation, the five governments can force any “communications service provider” (including ISPs, social media platforms, email providers, cell phone networks, and more) to:

  • Insert malware on its users’ devices.
  • Ignore existing laws in pursuit of Five Eyes directives.
  • Interfere with people’s user experience.
  • Provide governments with new product designs in advance.
  • Provide user information as requested in secret warrants.

What Is Nine Eyes?

Nine Eyes is another intelligence sharing agreement. It’s grown out of the original Five Eyes alliance. It includes all the Five Eyes members, plus Denmark, France, the Netherlands, and Norway.

Its powers and dedication to information sharing is broadly the same as the Five Eyes agreement.

What Is 14 Eyes?

The 14 Eyes agreement adds a further five countries to the list: Germany, Belgium, Italy, Spain, and Sweden.

Interestingly, both France and Germany have been close to becoming full Five Eyes members in 2009 and 2013 respectively. The two agreements both fell through for various reasons.

Lastly, it’s important to mention Israel and Singapore. Israel reportedly enjoys observer status with the main Five Eyes group, while Singapore has partnered with the group but is not an official member.

What Does This Mean for VPNs?

Given the sweeping powers granted by the three agreements, what impact does it have on your VPN service?

It’s all a question of jurisdiction. When talking about a VPN provider’s jurisdiction, there are three things to consider:

  • Local laws: Some countries outright ban VPN usage.
  • Company location: The state in which the VPN provider is registered and has its physical offices.
  • Server location: VPN providers typically offer servers in many different countries.

From a surveillance perspective, the two things you need to worry about are the company location and the company servers.

A VPN provider with either a physical address, or servers in the countries listed, could be compelled to hand over any information it has, including connection logs and browser traffic. The country might even monitor a VPN server’s inbound and outbound traffic. Worse still, the governments can forbid the provider from even notifying the affected customers; you lose the chance to respond to the invasion of privacy.

And, of course, due to the very nature of the agreements, once your information has been acquired by one country, it’s in the system. Ultimately, it could be shared with the other countries if they request it.

If security is your main priority, you shouldn’t use a VPN that’s domiciled in one of the Five, Nine, or 14 Eyes countries. Nor should you connect to servers in one of those countries using a VPN provider from a non-14 Eyes member.

If you really need to use a VPN provider from one of the Five, Nine, or 14 Eyes member countries (for example, due to a unique feature), make sure you select one that explicitly does not keep logs. However, not even that can adequately protect you.

For example, you don’t need to look any further than the once-popular US-based email provider, Lavabit.

When the FBI found out Edward Snowden had used the service, it requested the company’s logs. The company did not keep logs, so the FBI instead issued a subpoena for the SSL keys. The keys would have given the FBI access to metadata and unencrypted content for all Lavabit users.

To its credit, rather than hand over the information, Lavabit opted to shut down. You cannot be so confident that your VPN provider would be equally willing to fall on its sword.

Source: What Is “Five Eyes” Surveillance? VPN Users, Beware!

Categories: Uncategorized

LibreOffice Getting Started Guide Available to Download


Want to learn to use free office software LibreOffice? A new downloadable guide is on hand to help. The LibreOffice documentation team has announced a new

Source: LibreOffice Getting Started Guide Available to Download – OMG! Ubuntu!

Categories: Uncategorized

Google secretly logs users into Chrome whenever they log into a Google site | ZDNet

Google has made an important change to the way the Chrome browser works, a move the company did not advertise to its users in any way, and which has serious privacy repercussions.

According to several reports [ 123], starting with Chrome 69, whenever a Chrome user would access a Google-owned site, the browser would take that user’s Google identity and log the user into the Chrome in-browser account system –also known as Sync.

This system, Sync, allows users to log in with their Google accounts inside Chrome and optionally upload and synchronize local browser data (history, passwords, bookmarks, and other) to Google’s servers.

Sync has been present in Chrome for years, but until now, the system worked independently from the logged-in state of Google accounts. This allowed users to surf the web while logged into a Google account but not upload any Chrome browsing data to Google’s servers, data that may be tied to their accounts.

Now, with the revelations of this new auto-login mechanism, a large number of users are angry that this sneaky modification would allow Google to link that person’s traffic to a specific browser and device with a higher degree of accuracy.

That criticism proved to be wrong, as Google engineers have clarified on Twitter that this auto-login operation does not start the process of synchronizing local data to Google’s servers, which will require a user click.

Furthermore, they also revealed that the reason why this mechanism was added was for privacy reasons in the first place. Chrome engineers said the auto-login mechanism was added in the browser because of shared computers/browsers.

When one or more users would be using the same Chrome browser, data from one or more users would accidentally be sent to another person’s Google account.

Source: Google secretly logs users into Chrome whenever they log into a Google site | ZDNet

Categories: Uncategorized

Create a free website or blog at

%d bloggers like this: