noxz-sites

A collection of a builder and various scripts creating the noxz.tech sites
git clone https://noxz.tech/git/noxz-sites.git
noxz-sites

commit: 199f5a51e4a75f00dbfaa44649e3819f99906ca7
parent: 412683446822f0329316cc3445c23c16c3ffa7e9
author: Chris Noxz <chris@noxz.tech>
date:   Sun, 21 Jan 2024 16:58:15 +0100
add published articles to git repo
Anoxz.tech/articles/concatenating_pages_with_pdftk/.assemble1+
Anoxz.tech/articles/concatenating_pages_with_pdftk/.buildignore0
Anoxz.tech/articles/concatenating_pages_with_pdftk/.metadata6+
Anoxz.tech/articles/concatenating_pages_with_pdftk/.tags1+
Anoxz.tech/articles/concatenating_pages_with_pdftk/index.www103+++++++++++
Mnoxz.tech/articles/divisibility_theorems_and_fraction_flipping/.assemble2+-
Mnoxz.tech/articles/divisibility_theorems_and_fraction_flipping/index.www123+++++++++++++-
Anoxz.tech/articles/hacking-culture-and-capitalism/.assemble2+
Anoxz.tech/articles/hacking-culture-and-capitalism/.buildignore0
Anoxz.tech/articles/hacking-culture-and-capitalism/.metadata6+
Anoxz.tech/articles/hacking-culture-and-capitalism/.tags4+
Anoxz.tech/articles/hacking-culture-and-capitalism/hackers.pngBin0
Anoxz.tech/articles/hacking-culture-and-capitalism/index.www55++++++
Anoxz.tech/articles/lossless-pdf-canvas-size-modification/.assemble1+
Anoxz.tech/articles/lossless-pdf-canvas-size-modification/.buildignore0
Anoxz.tech/articles/lossless-pdf-canvas-size-modification/.metadata6+
Anoxz.tech/articles/lossless-pdf-canvas-size-modification/.tags1+
Anoxz.tech/articles/lossless-pdf-canvas-size-modification/index.www81+++++++++
Anoxz.tech/articles/record_screen_and_audio_using_ffmpeg/.assemble1+
Anoxz.tech/articles/record_screen_and_audio_using_ffmpeg/.buildignore0
Anoxz.tech/articles/record_screen_and_audio_using_ffmpeg/.metadata6+
Anoxz.tech/articles/record_screen_and_audio_using_ffmpeg/.tags1+
Anoxz.tech/articles/record_screen_and_audio_using_ffmpeg/index.www104++++++++++++
Anoxz.tech/articles/remove_soundcloud_vorbis_description/.assemble1+
Anoxz.tech/articles/remove_soundcloud_vorbis_description/.buildignore0
Anoxz.tech/articles/remove_soundcloud_vorbis_description/.metadata6+
Anoxz.tech/articles/remove_soundcloud_vorbis_description/.tags1+
Anoxz.tech/articles/remove_soundcloud_vorbis_description/index.www96+++++++++++
Anoxz.tech/articles/the_inefficency_of_cloud_computing/.assemble1+
Anoxz.tech/articles/the_inefficency_of_cloud_computing/.buildignore0
Anoxz.tech/articles/the_inefficency_of_cloud_computing/.metadata6+
Anoxz.tech/articles/the_inefficency_of_cloud_computing/.tags3+
Anoxz.tech/articles/the_inefficency_of_cloud_computing/index.www109++++++++++++
Anoxz.tech/articles/the_liberation_of_information/.assemble3+
Anoxz.tech/articles/the_liberation_of_information/.buildignore0
Anoxz.tech/articles/the_liberation_of_information/.metadata6+
Anoxz.tech/articles/the_liberation_of_information/.tags2+
Anoxz.tech/articles/the_liberation_of_information/gate.pngBin0
Anoxz.tech/articles/the_liberation_of_information/index.www179++++++++++++++++++++
Anoxz.tech/articles/the_liberation_of_information/sea.pngBin0
Mnoxz.tech/dictionary/index.www4+-
41 files changed, 911 insertions(+), 10 deletions(-)
diff --git a/noxz.tech/articles/concatenating_pages_with_pdftk/.assemble b/noxz.tech/articles/concatenating_pages_with_pdftk/.assemble
@@ -0,0 +1 @@
+index.html
diff --git a/noxz.tech/articles/concatenating_pages_with_pdftk/.buildignore b/noxz.tech/articles/concatenating_pages_with_pdftk/.buildignore
diff --git a/noxz.tech/articles/concatenating_pages_with_pdftk/.metadata b/noxz.tech/articles/concatenating_pages_with_pdftk/.metadata
@@ -0,0 +1,6 @@
+.ds YEAR    2023
+.ds MONTH   October
+.ds DAY     21
+.ds DATE    \*[MONTH] \*[DAY], \*[YEAR]
+.ds TITLE   Concatenating pages with PDFTK
+.ds AUTHOR  Chris Noxz
diff --git a/noxz.tech/articles/concatenating_pages_with_pdftk/.tags b/noxz.tech/articles/concatenating_pages_with_pdftk/.tags
@@ -0,0 +1 @@
+howto
diff --git a/noxz.tech/articles/concatenating_pages_with_pdftk/index.www b/noxz.tech/articles/concatenating_pages_with_pdftk/index.www
@@ -0,0 +1,103 @@
+.B PDFTK
+(PDF Toolkit) is a command-line tool that allows users to manipulate PDF
+files in various ways, including combining, splitting, and modifying PDF
+documents. This article focuses on using PDFTK to concatenate a range of
+pages from one or more PDF files into a new PDF file.
+
+.HnS 1
+Overview
+.HnE
+
+Concatenation is the process of merging multiple PDF files or a range of pages
+from one or more PDF files into a single PDF document. PDFTK simplifies this
+task with a straightforward command-line interface. The resulting PDF file
+retains the original order of pages, allowing for various use cases such as
+merging chapters of a book, assembling reports, or creating custom
+presentations.
+
+
+.HnS 1
+Concatenating Pages
+.HnE
+
+To concatenate a range of pages from one or more PDF files into a new PDF file,
+follow these steps:
+
+.DLS
+.LI "Open the Terminal or Command Prompt:"
+Launch your system's terminal or command prompt. Ensure that PDFTK is installed
+and available in your system's PATH.
+
+.LI "Use the `cat` Command:"
+The
+.ICD cat
+command is used to concatenate pages. The basic syntax for concatenating PDF
+files or pages is as follows:
+
+.CDS
+.COS
+pdftk file1.pdf file2.pdf cat output output.pdf
+.COE
+.CDE
+
+Replace
+.ICD file1.pdf ,
+.ICD file2.pdf ,
+and
+.ICD output.pdf
+with the appropriate file names and paths. This command concatenates
+.ICD file1.pdf
+and
+.ICD file2.pdf
+into a new PDF file called
+.ICD output.pdf .
+
+.LI "Concatenate Specific Pages:"
+To concatenate specific pages from a source PDF file, use the
+.ICD cat
+command with a range specification. For example, to concatenate pages 3 to 6
+from
+.ICD source.pdf ,
+use the following command:
+
+.CDS
+.COS
+pdftk source.pdf cat 3-6 output output.pdf
+.COE
+.CDE
+
+This command concatenates pages 3 to 6 from
+.ICD source.pdf
+into a new PDF file called
+.ICD output.pdf .
+
+.LI "Concatenate Multiple Ranges:"
+You can concatenate multiple ranges of pages from a single PDF file or from
+multiple PDF files into the same output file. For example:
+
+.CDS
+.COS
+pdftk A=source1.pdf B=source2.pdf cat A1-3 B4-6 A4 output output.pdf
+.COE
+.CDE
+
+This command concatenates pages 1 to 3 from
+.ICD source1.pdf
+and pages 4 to 6 from
+.ICD source2.pdf
+and page 4 from
+.ICD source1.pdf
+into a new PDF file called
+.ICD output.pdf .
+.DLE
+
+.HnS 1
+Conclusion
+.HnE
+
+PDFTK is a powerful tool for concatenating pages from one or more PDF file
+into a new PDF document. Whether you need to merge chapters of a book, assemble
+a report, or create custom presentations, PDFTK provides a convenient and
+efficient way to perform these tasks. With the ability to specify page ranges,
+you have full control over the content you want to include in the final
+document.
diff --git a/noxz.tech/articles/divisibility_theorems_and_fraction_flipping/.assemble b/noxz.tech/articles/divisibility_theorems_and_fraction_flipping/.assemble
@@ -1,2 +1,2 @@
 index.html
-grohtml-*.png
+eqn-*.png
diff --git a/noxz.tech/articles/divisibility_theorems_and_fraction_flipping/index.www b/noxz.tech/articles/divisibility_theorems_and_fraction_flipping/index.www
@@ -56,6 +56,10 @@
 .URL #math-rev-div-alg-script "Python script for finding recursive divisibility algorithms"
 .LI
 2.2
+.URL #math-rev-div-alg-find "Finding all divisibility algorithms for primes"
+.HnE
+.LI
+2.3
 .URL #math-rev-div-alg-alt "Alternative way of deriving recursive divisibility algorithms"
 .ULE
 .LI
@@ -1136,7 +1140,7 @@ rules along with their corresponding
 .I n .
 However, I haven’t ensured that all the rules found actually work in all cases;
 there could be false positives. They would need to be proven algebraically
-first. The ones I know to be correct, including 11, are:
+first. The ones I have proven to be correct, including 11, are:
 
 .CDS
 .COS
@@ -1144,8 +1148,6 @@ first. The ones I know to be correct, including 11, are:
 11: -1
 13: +4
 17: -5
-19: +2
-23: +7
 .COE
 .CDE
 
@@ -1153,8 +1155,7 @@ Before you think that the pattern is connected to prime numbers, try the
 algorithm with divisibility by 27 using
 .I n
 = -8. The next working number after 27 is, in fact, 29, and all prime numbers
-appear to be included when I tested numbers up to 100. However, as I mentioned,
-I have not algebraically proven them. There are in fact some other patterns...
+are included. There are in fact some other interesting patterns...
 
 .HnS 2
 .TAG "math-rev-div-alg-script"
@@ -1250,11 +1251,117 @@ and up:
 .COE
 .CDE
 
-Even if the code won't include 3 and 9, they do follow the same pattern.
+Even if the script won't output 3 and 9, they do follow the same pattern.
 And the same could technically be said about 1. So, the pattern actually starts
-at 1!
+at 1 and continues into infinity. And as all prime numbers end with either 1,
+3, 7 or 9, except for 2 and 5, all prime numbers are included. This is a known
+sequence:
+.URL https://oeis.org/A333448 https://oeis.org/A333448
+
+.HnS 2
+.TAG "math-rev-div-alg-find"
+Finding all divisibility algorithms for primes
+.HnE
+Based on the output from the script and the knowledge about all primes being
+included, except for 2 and 5, we could construct a short list of everything we
+need to find out if a number is divisible by any prime number.
+
+What we need:
+.OLS
+.LI
+The divisibility rule for the prime number 2: is the last digit an even number?
+
+.EQ
+2 ~|~ abcd ~iff~ 2 ~|~ d
+.EN
+
+.LI
+The divisibility rule for the prime number 5: is the last digit a 5 or a 0?
+
+.EQ
+5 ~|~ abcd ~iff~ 5 ~|~ d
+.EN
+
+.LI
+A general rule for any number with the last digit being 1, 3, 7 or 9, including
+the rest of all prime numbers:
+
+.EQ
+n ~|~ abcd ~iff~ n ~|~ abc ~+~ D(n) times d
+.EN
+
+.LI
+A way to calculate D(n):
+
+.EQ
+D(n) ~\[==]~ left {
+matrix {
+lcol {
+~9a + 1,
+above
+~3a + 1,
+above
+~7a + 5,
+above ~a + 1,
+}
+lcol {
+roman{if} ~n = 10a+1
+above
+roman{if} ~n = 10a+3
+above
+roman{if} ~n = 10a+7
+above
+roman{if} ~n = 10a+9
+}
+}
+.EN
+
+If we want a small number,
+.I D(n) ,
+to add or subtract:
+
+.EQ
+D sub {s}(n) ~\[==]~ left {
+matrix {
+lcol {
+D(n) - n,
+above
+D(n),
+}
+lcol {
+roman{if} ~n - D(n) < D(n)
+above
+roman{otherwise}
+}
+}
+.EN
+.OLE
 
-Happy hunting!
+Example, get the divisibility algorithm for the prime number 71:
+
+.EQ
+lpile{
+{ D(71) = 9 times 7 + 1 = 64 }
+above
+{ D sub {s}(n) = 64 - 71 = -7 }
+above
+{ implies~ 71~|~abcd ~iff~ 71~|~abc -7d }
+}
+.EN
+
+Find out if 87614 is divisible by 71:
+
+.EQ
+lpile{
+{ 8761 -7 times 4 = 8733 }
+above
+{ 873 -7 times 3 = 852 }
+above
+{ 85 -7 times 2 = 71 }
+above
+{ 71 ~|~ 71 ~implies~ 71 ~|~ 87614 }
+}
+.EN
 
 .HnS 2
 .TAG "math-rev-div-alg-alt"
diff --git a/noxz.tech/articles/hacking-culture-and-capitalism/.assemble b/noxz.tech/articles/hacking-culture-and-capitalism/.assemble
@@ -0,0 +1,2 @@
+index.html
+hackers.png
diff --git a/noxz.tech/articles/hacking-culture-and-capitalism/.buildignore b/noxz.tech/articles/hacking-culture-and-capitalism/.buildignore
diff --git a/noxz.tech/articles/hacking-culture-and-capitalism/.metadata b/noxz.tech/articles/hacking-culture-and-capitalism/.metadata
@@ -0,0 +1,6 @@
+.ds YEAR    2023
+.ds MONTH   November
+.ds DAY     04
+.ds DATE    \*[MONTH] \*[DAY], \*[YEAR]
+.ds TITLE   Hacking Culture: a radical challenge to Capitalism, not its offspring
+.ds AUTHOR  Chris Noxz
diff --git a/noxz.tech/articles/hacking-culture-and-capitalism/.tags b/noxz.tech/articles/hacking-culture-and-capitalism/.tags
@@ -0,0 +1,4 @@
+anarchism
+anti-capitalism
+hacking
+open access
diff --git a/noxz.tech/articles/hacking-culture-and-capitalism/hackers.png b/noxz.tech/articles/hacking-culture-and-capitalism/hackers.png
diff --git a/noxz.tech/articles/hacking-culture-and-capitalism/index.www b/noxz.tech/articles/hacking-culture-and-capitalism/index.www
@@ -0,0 +1,55 @@
+There has been attempts, for example by Linus Torvalds
+.TAG-REF cite_himanen_2001 "Himanen, 2001" ,
+to link hacking culture and its ethics to the protestant work ethic and the spirit of capitalism. This perspective, I would argue, misses the fundamental ethos of hacking culture, which can be said to have emerged as a radical challenge to capitalism and big centralized structures. The hacking culture was deeply rooted in a countercultural movement of the 1960s that aimed to "overturn the machine". From an anarchic perspective, hacking represents a call for mutuality and collective cooperation, rather than an embrace of capitalist values. The hackers of that era were not seeking to mimic capitalist ideals but to subvert them. They wanted technology to be a tool for regular citizens, not just a means for corporations to consolidate their power. To suggest that hacking culture shares the same values as capitalism fundamentally misrepresents its core intentions.
+
+.PIMG hackers.png
+
+The 1960s counterculture, which in some sense gave birth to hacking culture, was a period of revolt against oppressive systems and authority. The ideal of "overturning the machine" meant dismantling hierarchical structures while abolishing the monopoly of experts. Hackers appreciated technology, and we still do, but not as a means to enhance the power of big corporations. Hackers then envisioned technology as a way to empower individuals and communities, to liberate them from oppressive systems, not to strengthen them.
+
+Hacking, as an activity, is open to interpretation. Some may argue that individuality is an inherent aspect of hacking, and it can indeed be a way for individuals to express and explore aspects of themselves in a digital world. However, this individuality does not equate to embracing capitalist values. It's about personal expression within a collective framework.
+
+Hacking culture, at its essence, embodies principles of anarchic mutuality and collective cooperation. Hackers often work together in various projects, where knowledge and code are shared freely for the common good. This ethos promotes the idea that technology should be a collaborative effort that benefits everyone, not a tool for private and individual profit within centralized control.
+
+.HnS 1
+The ethos of Hacking Culture
+.HnE
+
+Through an analysis from the perspective of an anarchist hacker, the ethical principles of hacking culture instead offer an anti-capitalist view. These principles challenge conventional capitalist norms and, indeed, question the alignment of hacking with capitalist values. However, these ethical principles are not without scrutiny. Let's explore these principles in-depth.
+
+.OLS
+.LI
+.B "Unlimited access to knowledge:"
+The belief that access to computers and the knowledge they provide should be unlimited and total emphasizes the importance of open and total access. This aligns with the anarchic idea that information should be freely accessible, allowing individuals to empower themselves and their communities. It questions the hierarchical control of knowledge that mirrors capitalist structures.
+
+.LI
+.B "Freedom of information:"
+The concept that all information should be free aligns with the anarchic ethos of breaking down oppressive power structures. It advocates for the open dissemination of information, challenging the notion of information being controlled or monetized, which is often tied to capitalist interests.
+
+.LI
+.B "Mistrust authority \(en Promote decentralization:"
+This philosophy underscores the idea that an open system, free from bureaucratic boundaries, is the best way to facilitate the exchange of information and tools for hackers in their quest for knowledge and improvement. It challenges centralized authority, and instead mirrors the decentralized principles of anarchism.
+
+.LI
+.B "Judging hackers by their hacking:"
+While the principle that hackers should be judged by their hacking skills is by many seen as a form of meritocracy, it's essential to recognize that this perspective is not in line with the anarchic spirit of hacking. Hacking should not be about establishing a hierarchy of superiority, but rather fostering creativity, collaboration, and the liberation of knowledge and technology for the betterment of all. It's a challenge to the conventional meritocratic view, emphasizing inclusivity and the value of individual contributions without imposing arbitrary hierarchies. Hacking should be about fun, liberation, and the exploration of possibilities, rather than a means of judgment. This anarchic approach is also deeply decolonial, challenging commonly accepted social rules and norms, while rejecting irrelevant criteria like degrees, age, race, or position.
+
+.LI
+.B "Creating art and beauty on a computer:"
+Acknowledging that computers can be used for artistic expression and creating beauty is a testament to the creative potential of technology. However, it prompts a discussion about the ethical boundaries of such art. Is there not then a responsibility for hackers to consider the impact of their creations on society and individuals, particularly when it comes to addressing oppressive, misogynistic, and racist art that instead upholds commonly accepted social rules and norms?
+
+.LI
+.B "Computers changing lives for the better:"
+While computers have brought about positive changes, they have also been used to perpetuate oppression through means such as surveillance and biased AI implementations in critical systems, including the judicial system. The ethical challenge lies in how technology is harnessed and the consequences of its use. These technologies can perpetuate systemic biases and inequalities, making it crucial to critically examine the role of computers in social justice and equality from an anti-capitalist anarchic perspective.
+.OLE
+
+Ultimately, hacking ethics are a dynamic and evolving domain, reflecting the ever-changing landscape of technology and its impact on society. It's then crucial for hackers and the wider community to continually assess the consequences of their actions, recognizing that the line between liberation and opression can be a fine one. The ethical compass of hacking will continue to guide and provoke discussions in the quest for a more just and equitable digital world.
+
+However, the attempt to link hacking culture to the protestant work ethic and capitalism is, indeed, a misinterpretation of its core values. Hacking emerged as a radical challenge to the capitalist status quo and centralized power structures, with the aim of empowering regular citizens. From an anarchic perspective, hacking stands for mutuality and collective cooperation, which are fundamentally at odds with the individualistic and profit-driven nature of capitalism. Hacking, in its true essence, is a powerful force for dismantling oppressive systems and advancing a more equitable and decentralized society.
+
+.HnS 1
+References
+.HnE
+
+.REF "cite_himanen_2001" "Himanen, Pekka (2001). \
+\f[I]The Hacker Ethic and the Spirit of the Information Age\f[]. \
+New York: Random House."
diff --git a/noxz.tech/articles/lossless-pdf-canvas-size-modification/.assemble b/noxz.tech/articles/lossless-pdf-canvas-size-modification/.assemble
@@ -0,0 +1 @@
+index.html
diff --git a/noxz.tech/articles/lossless-pdf-canvas-size-modification/.buildignore b/noxz.tech/articles/lossless-pdf-canvas-size-modification/.buildignore
diff --git a/noxz.tech/articles/lossless-pdf-canvas-size-modification/.metadata b/noxz.tech/articles/lossless-pdf-canvas-size-modification/.metadata
@@ -0,0 +1,6 @@
+.ds YEAR    2023
+.ds MONTH   November
+.ds DAY     03
+.ds DATE    \*[MONTH] \*[DAY], \*[YEAR]
+.ds TITLE   Losslessly changing the canvas size of a PDF
+.ds AUTHOR  Chris Noxz
diff --git a/noxz.tech/articles/lossless-pdf-canvas-size-modification/.tags b/noxz.tech/articles/lossless-pdf-canvas-size-modification/.tags
@@ -0,0 +1 @@
+howto
diff --git a/noxz.tech/articles/lossless-pdf-canvas-size-modification/index.www b/noxz.tech/articles/lossless-pdf-canvas-size-modification/index.www
@@ -0,0 +1,81 @@
+When handling PDF files, you might encounter situations where you need to modify the page dimensions without making changes to the content. This can be especially useful for adjusting a PDF for printing or other purposes.
+.ICD pdftocairo
+is a command-line utility that can help you accomplish this task effectively. In this guide, I'll walk you through the process of modifying the page dimensions of a PDF using
+.ICD pdftocairo ,
+with a specific example of resizing the page to A3.
+
+.HnS 1
+Prerequisites
+.HnE
+
+Before you begin, ensure that you have the following prerequisites in place:
+
+.ULS
+.LI
+A Unix-like operating system, such as Linux.
+.LI
+The pdftocairo tool, which is part of the
+.URL "https://poppler.freedesktop.org/" "Poppler library" .
+You can install
+.ICD poppler
+on Linux using your distribution's package manager, such as
+.ICD apt ,
+.ICD pacman ,
+or
+.ICD xbps .
+.ULE
+
+
+.HnS 1
+Procedure
+.HnE
+
+.DLS
+.LI "Open Your Command-Line Interface:"
+Begin by launching your terminal of choice on your Unix-like operating system.
+
+.LI "Navigate to the Directory Containing Your PDF File:"
+Utilize the cd command to navigate to the folder where your PDF file is stored. If your file is in a folder called "documents", you can navigate there using the following command:
+
+.CDS
+.COS
+cd /path/to/my/documents
+.COE
+.CDE
+
+.LI "Modify the Page Dimensions:"
+To adjust the page dimensions to A3, use the
+.ICD pdftocairo
+command with the
+.ICD -paper
+option. This option should be followed by the desired paper size and the filenames of the input and output files. In the example below, I'll use "file.pdf" as the input file and "file_a3.pdf" as the output file:
+
+.CDS
+.COS
+pdftocairo -pdf -paper A3 file.pdf file_a3.pdf
+.COE
+.CDE
+
+.ULS
+.LI
+.ICD -pdf :
+This flag specifies the output format as PDF.
+.LI
+.ICD -paper :
+The paper option enables you to select the preferred paper size.
+.LI
+.ICD A3 :
+Specifies the paper size as A3. You can choose from various standard paper sizes, such as A4, Letter, or Legal, and even define custom dimensions.
+.ULE
+
+.LI "Execute the Command:"
+After entering the
+.ICD pdftocairo
+command, press Enter to execute it.
+.ICD pdftocairo
+will process the input PDF file and generate a new PDF file with the adjusted page dimensions.
+
+.LI "Inspect the Output (important!):"
+Once the command has completed, you'll find the modified PDF file with the updated page dimensions in your working directory. In this example, it will be named "file_a3.pdf." You can open it with a PDF viewer, such as
+.ICD zathura ,
+to confirm that the page dimensions have been changed to A3 without affecting the content.
diff --git a/noxz.tech/articles/record_screen_and_audio_using_ffmpeg/.assemble b/noxz.tech/articles/record_screen_and_audio_using_ffmpeg/.assemble
@@ -0,0 +1 @@
+index.html
diff --git a/noxz.tech/articles/record_screen_and_audio_using_ffmpeg/.buildignore b/noxz.tech/articles/record_screen_and_audio_using_ffmpeg/.buildignore
diff --git a/noxz.tech/articles/record_screen_and_audio_using_ffmpeg/.metadata b/noxz.tech/articles/record_screen_and_audio_using_ffmpeg/.metadata
@@ -0,0 +1,6 @@
+.ds YEAR    2023
+.ds MONTH   October
+.ds DAY     15
+.ds DATE    \*[MONTH] \*[DAY], \*[YEAR]
+.ds TITLE   Record screen with audio (loopback) using FFmpeg
+.ds AUTHOR  Chris Noxz
diff --git a/noxz.tech/articles/record_screen_and_audio_using_ffmpeg/.tags b/noxz.tech/articles/record_screen_and_audio_using_ffmpeg/.tags
@@ -0,0 +1 @@
+howto
diff --git a/noxz.tech/articles/record_screen_and_audio_using_ffmpeg/index.www b/noxz.tech/articles/record_screen_and_audio_using_ffmpeg/index.www
@@ -0,0 +1,104 @@
+Recording your screen with audio, including loopback audio, can be a valuable
+skill for creating tutorials, capturing gameplay, or archiving video
+conferences. This guide will show you how to use FFmpeg to record your screen
+along with loopback audio with ALSA as backend.
+
+.HnS 1
+Steps
+.HnE
+
+.DLS
+.LI "Load `snd-aloop` Module:"
+To enable loopback audio recording, you need to load the
+.ICD snd-aloop
+module with a single PCM substream. Use the following command (use
+.ICD sudo
+if you don't have
+.ICD doas
+installed):
+
+.CDS
+.COS
+doas modprobe snd-aloop pcm_substreams=1
+.COE
+.CDE
+
+.LI "Edit the ALSA Configuration File:"
+To direct audio output to the loopback device and record it, edit your ALSA
+configuration file. This step involves creating or appending to
+.ICD /etc/asound.conf .
+This will temporarily disable audio output. Execute the following command:
+
+.CDS
+.COS
+echo 'pcm.!default { type plug slave.pcm "hw:Loopback,0,0" }' >> /etc/asound.conf
+.COE
+.CDE
+
+If you wish to record audio from an application while also routing the audio to
+an output device, you can find alternative configurations on the
+.URL "https://trac.ffmpeg.org/wiki/Capture/ALSA" "FFmpeg Wiki" .
+
+.LI "Start Recordning:"
+Now, you can start the actual screen recording. In this example, we'll record a
+1280x1080 portion of the screen starting from coordinates 0,0 using the ALSA
+audio hardware 'Loopback,1,0'. You can adjust the resolution and other
+parameters as needed.
+
+.CDS
+.COS
+ffmpeg -video_size 1280x1080 -framerate 25 -f x11grab -i :0.0+0,0 -f alsa -ac 2 -ar 44100 -i hw:Loopback,1,0 output.mkv
+.COE
+.CDE
+
+.ULE
+.LI
+.ICD "-video_size" :
+Sets the video size to 1280x1080 pixels.
+
+.LI
+.ICD "-framerate" :
+Specifies the frame rate (25 frames per second in this example).
+
+.LI
+.ICD "-f x11grab" :
+Uses the x11grab input format for screen capture.
+
+.LI
+.ICD "-i :0.0+0,0" :
+Specifies the screen area to capture (0,0 starting from the top-left corner).
+
+.LI
+.ICD "-f alsa" :
+Sets the audio input format to ALSA.
+
+.LI
+.ICD "-ac 2" :
+Configures 2 audio channels.
+
+.LI
+.ICD "-ar 44100" :
+Sets the audio sample rate to 44.1 kHz.
+
+.LI
+.ICD "-i hw:Loopback,1,0" :
+Specifies the loopback audio input.
+
+.LI
+.ICD "output.mkv" :
+Defines the output file name (you can use any desired format).
+.ULS
+
+.LI "Stop Recording:"
+To stop the recording, simply press
+.ICD Ctrl+C
+in the terminal where you started FFmpeg.
+
+.LI "Re-enable Audio Output:"
+Once you've finished your recording, remove or comment out the line added to
+.ICD "/etc/asound.conf"
+in step 2. This will re-enable audio output on your system.
+.DLE
+
+Now you can record your screen with loopback audio using FFmpeg. This can be
+especially useful for various content creation and screen capture needs.
diff --git a/noxz.tech/articles/remove_soundcloud_vorbis_description/.assemble b/noxz.tech/articles/remove_soundcloud_vorbis_description/.assemble
@@ -0,0 +1 @@
+index.html
diff --git a/noxz.tech/articles/remove_soundcloud_vorbis_description/.buildignore b/noxz.tech/articles/remove_soundcloud_vorbis_description/.buildignore
diff --git a/noxz.tech/articles/remove_soundcloud_vorbis_description/.metadata b/noxz.tech/articles/remove_soundcloud_vorbis_description/.metadata
@@ -0,0 +1,6 @@
+.ds YEAR    2023
+.ds MONTH   October
+.ds DAY     10
+.ds DATE    \*[MONTH] \*[DAY], \*[YEAR]
+.ds TITLE   Removing SoundCloud Vorbis description
+.ds AUTHOR  Chris Noxz
diff --git a/noxz.tech/articles/remove_soundcloud_vorbis_description/.tags b/noxz.tech/articles/remove_soundcloud_vorbis_description/.tags
@@ -0,0 +1 @@
+howto
diff --git a/noxz.tech/articles/remove_soundcloud_vorbis_description/index.www b/noxz.tech/articles/remove_soundcloud_vorbis_description/index.www
@@ -0,0 +1,96 @@
+When downloading music from sites like SoundCloud using
+.ICD yt-dlp ,
+you may encounter OGG/Vorbis files that include metadata, such as a
+description. If you wish to remove this metadata, you can use the vorbiscomment
+utility in combination with a simple script. Here's a guide on how to achieve
+this.
+
+.HnS 1
+Using
+.ICD yt-dlp
+.HnE
+
+.DLS
+.LI "Download Music from SoundCloud:"
+Use
+.ICD yt-dlp
+to download the music from SoundCloud. Ensure that the downloaded
+music is in OGG/Vorbis format. For example:
+
+.CDS
+.COS
+yt-dlp -x --audio-format vorbis [SoundCloud URL]
+.COE
+.CDE
+
+Replace
+.ICD "[SoundCloud URL]"
+with the actual URL of the SoundCloud track you want to download.
+
+.LI "Check Metadata:"
+Before removing the description, check if the OGG/Vorbis file includes a
+description. You can use the
+.ICD vorbiscomment
+utility for this:
+
+.CDS
+.COS
+vorbiscomment -l [yourfile.ogg]
+.COE
+.CDE
+
+If you find a "DESCRIPTION" tag in the output, it means that a description is
+present and can be removed.
+
+.HnS 1
+Using the Removal Script
+.HnE
+
+You can use the following script to remove the description metadata:
+
+.CDS
+.COS
+for f in *.ogg; do
+   vorbiscomment -l "$f" | sed '/^[Dd][Ee][Ss][Cc][Rr][Ii][Pp][Tt][Ii][Oo][Nn]=/,/^purl=/{/purl=/!d}' | vorbiscomment -w "$f";
+   echo "Removed description from $f";
+done
+.COE
+.CDE
+
+.DLE
+
+Here's how the script works:
+
+.ULS
+.LI
+It iterates through all OGG/Vorbis files in the current directory.
+
+.LI
+The
+.ICD "vorbiscomment -l '$f'"
+command lists the metadata tags in the file.
+
+.LI
+The
+.ICD sed
+command filters out all lines between the "DESCRIPTION" and "purl" tags and
+deletes them, effectively removing the description.
+
+.LI
+The
+.ICD "vorbiscomment -w '$f'"
+command writes the modified metadata back to the file.
+
+.LI
+Finally, it prints a message to confirm the removal of the description from
+each file.
+.ULE
+
+After running the script, the OGG/Vorbis files will no longer contain the
+SoundCloud description metadata.
+
+By following these steps, you can successfully remove SoundCloud Vorbis
+descriptions from OGG/Vorbis files downloaded using
+.ICD yt-dlp .
+This can be helpful for organizing and managing your music library without the
+additional metadata.
diff --git a/noxz.tech/articles/the_inefficency_of_cloud_computing/.assemble b/noxz.tech/articles/the_inefficency_of_cloud_computing/.assemble
@@ -0,0 +1 @@
+index.html
diff --git a/noxz.tech/articles/the_inefficency_of_cloud_computing/.buildignore b/noxz.tech/articles/the_inefficency_of_cloud_computing/.buildignore
diff --git a/noxz.tech/articles/the_inefficency_of_cloud_computing/.metadata b/noxz.tech/articles/the_inefficency_of_cloud_computing/.metadata
@@ -0,0 +1,6 @@
+.ds YEAR    2023
+.ds MONTH   October
+.ds DAY     23
+.ds DATE    \*[MONTH] \*[DAY], \*[YEAR]
+.ds TITLE   Redefining data storage: A case against cloud computing
+.ds AUTHOR  Chris Noxz
diff --git a/noxz.tech/articles/the_inefficency_of_cloud_computing/.tags b/noxz.tech/articles/the_inefficency_of_cloud_computing/.tags
@@ -0,0 +1,3 @@
+data privacy
+digital autonomy
+sustainability
diff --git a/noxz.tech/articles/the_inefficency_of_cloud_computing/index.www b/noxz.tech/articles/the_inefficency_of_cloud_computing/index.www
@@ -0,0 +1,109 @@
+.P preamble
+In the digital age, our reliance on data storage and computation has grown exponentially. This surge in demand for storage and processing power has given rise to the phenomenon known as "cloud computing", which has been praised for its presumed convenience and accessibility. However, a closer look at cloud storage and computation reveals startling inefficiencies, often overlooked by consumers and organizations alike. In this article, we delve into the drawbacks of cloud computing and its implications for our collective environment. Additionally, we explore the loss of privacy, security, and transparency when using computers controlled by others. This article will also investigate the impact of cloud computing and cloud storage, particularly in handling students' data.
+
+.HnS 1
+The Allure of Cloud Computing
+.HnE
+
+The alluring prospects presented by cloud computing have cast a powerful spell on us. The promise of unfettered access to data from virtually anywhere, coupled with the prospect of diminished hardware and maintenance expenses, has enticed both individuals and organizations. The allure doesn't end there; cloud computing boasts the
+.I magic
+of seamless scalability, allowing for the effortless expansion or contraction of resources as needed. It's the convenience of relinquishing the burden of carrying physical storage devices, and thereby liberating individuals and organizations from the constraints of physicality.
+
+The cloud beckons with a seductive call, and its siren song has reshaped our digital landscape. The transition to cloud computing reflects our innate desire for convenience, efficiency, and the boundless potential of a connected world. Yet, it's essential to maintain a discerning eye, for behind the allure lie complexities and challenges that suggest us to tread with caution. While the cloud's benefits can seem undeniable, the journey into this digital realm must be guided by a mindful understanding of the potential costs, both in terms of environmental impact and the loss of digital autonomy.
+
+.HnS 1
+Data Centers: The Energy Guzzlers
+.HnE
+
+Behind the convenience of cloud computing lie vast data centers \(en enormous facilities filled with servers that store and process the data we entrust to the cloud. These data centers require an immense amount of electricity to operate and maintain the desired environmental conditions, such as temperature and humidity.
+
+What's more, the colossal power consumption of these data centers has far-reaching consequences. It deepens our dependence on non-renewable resources, perpetuating an unsustainable energy infrastructure. This not only exacerbates the environmental crisis but also maintains a stranglehold on our ability to forge a sustainable, more autonomous energy future. The energy chaos created by these data centers is a stark reminder that the digital age must heed the call for sustainable, decentralized energy production to break free from the shackles of environmental degradation and social energy inequality.
+
+.HnS 1
+The Hidden Environmental Costs
+.HnE
+
+It is essential to shed light on another critical aspect of data centers' environmental impact \(en water consumption. To maintain the optimal temperature for servers and prevent overheating, these behemoths rely on an abundance of water. While water proves to be an efficient cooling agent, the consequences of this dependency extend well beyond the server rooms. These facilities, often situated in regions with arid climates, intensify the strain on already-scarce groundwater resources. The thirst for water in cooling processes exacerbates the depletion of local aquifers, competing with essential uses such as providing drinking water to nearby communities.
+
+This environmental paradox becomes painfully evident when we recognize that the same technology that is said to propel us into a more connected and efficient future is, in many cases, leaving arid regions parched. The act of cooling data centers, while vital for their operation, inadvertently contributes to the very water scarcity that threatens the sustainability of the local environment and the well-being of the communities that rely on these critical water sources. It's a stark reminder that almost every technological advancement comes with an environmental cost, and we must take steps toward more sustainable practices.
+
+Moreover, it's crucial to acknowledge that these water-intensive cooling practices are, at their core, cost-effective measures employed by the owners of data centers to maximize profits. While they may represent an economical solution in the short term, they come at the expense of our environment and, ultimately, our collective future. Instead, liquid cooling solutions that recirculate and purify water, can significantly reduce water consumption while maintaining optimal server temperatures. Furthermore, harnessing renewable energy sources, such as solar or wind power, for data center operations can curb the carbon footprint associated with their energy consumption.
+
+.HnS 1
+Loss of Privacy, Security, and Transparency
+.HnE
+
+.HnS 2
+Data Ownership and Control
+.HnE
+As data finds its home within the sprawling confines of data centers, a fundamental shift occurs in the balance of control and ownership. This transition, though often subtle, carries profound implications for the individuals and organizations entrusting their valuable information to these service providers.
+
+The service providers wield a considerable degree of power over the data. They are granted privileged access, and it is within this enclave that concerns about privacy, security, and the ethical handling of information arise. While service providers play a critical role in safeguarding the integrity of data, the very act of relinquishing control exposes users to the risks of data breaches and misuse. The challenge lies in the balance between entrusting service providers with the data's care and maintaining vigilant oversight to ensure the privacy and security of this digital capital. Computing should never come at the cost of our data's security and integrity.
+
+.HnS 2
+Security Vulnerabilities
+.HnE
+
+The centralized nature of data storage within these data centers also presents an enticing target for malicious actors. Like moths drawn to a flame, cybercriminals recognize the allure of these digital fortresses, each brimming with a treasure trove of sensitive information. In their quest for ill-gotten gains, they seek vulnerabilities within the data center's defenses, exploiting weaknesses in pursuit of unauthorized access.
+
+The consequences of a successful breach are nothing short of a digital nightmare. A breach in the data center's security can unleash a cascade of privacy violations and potential harm. Sensitive information that once enjoyed the sanctuary of the digital fortress becomes exposed. Personal data, financial records, and more may fall into the wrong hands, leading to identity theft, financial loss, or worse.
+
+This vulnerability highlights the pressing need for a security paradigm shift, away from centralized models that concentrate risk and toward decentralized, resilient structures that distribute and fortify data against potential breaches.
+
+.HnS 2
+Lack of Transparency
+.HnE
+
+These digital fortresses, entrusted with safeguarding our most sensitive data, often operate in the shadows, concealing the intricacies of their security measures and data handling practices. This veil of secrecy, while perhaps well-intentioned, casts a pall over the realm of transparency, leaving users and organizations in the dark about the true nature of their data's management and protection.
+
+The absence of transparency yields a troubling reality where the guardians of our data operate beyond the reach of scrutiny and accountability. Users, who have willingly surrendered their digital possessions to these enigmatic custodians, find themselves grappling with uncertainty regarding the fate of their information. This obscurity should raise questions about the ethics and principles guiding data handling within these centers of power.
+
+.HnS 1
+Cloud Computing in Educational Institutions
+.HnE
+
+In the digital transformation of educational institutions, cloud computing and storage have emerged as the torchbearers of convenience and accessibility. Many schools and universities have eagerly embraced these technologies to streamline their operations and enhance the learning experience. However, this digital leap often comes at a price. Students' data, brimming with personal information and academic records, is entrusted to the cloud's care. The allure of third-party cloud services is undeniable, yet it raises profound concerns about the privacy and security of sensitive information. The very essence of educational institutions is rooted in the trust placed in them to nurture knowledge and protect the privacy of their students. Therefore, robust security measures are not just a recommendation but a necessity.
+
+Given the paramount importance of data security and the potential consequences of breaches and unauthorized access, a strong argument can be made against relying on cloud solutions for educational institutions. The digital era presents alternatives that allow schools and universities to maintain more control over their students' data and uphold their commitment to education without exposing sensitive information to the potential risks associated with third-party cloud services. By keeping data within their own secure systems, educational institutions can ensure greater protection of privacy and maintain their duty to safeguard the well-being of the students they serve.
+
+.HnS 1
+Offline Storage as an Alternative
+.HnE
+
+While the allure of cloud storage may be strong, especially given its modern appeal, there's a potent argument to be made for embracing solutions that have stood the test of time. For educational institutions, particularly those entrusted with the sensitive data of students, the case for tried-and-true offline data storage, such as USB sticks or drives, shines brightly as an alternative that warrants serious consideration.
+
+USB storage devices embody a level of reliability and simplicity that has been honed over decades. They offer a portable, plug-and-play solution that requires no continuous energy supply. This is in stark contrast to the energy-intensive operations of remote data centers. USB sticks or drives are masters of efficiency, serving as dependable vessels for data that don't rely on vast server farms or the inefficiencies of data transmission across digital highways.
+
+A transition toward offline data storage can also empower students themselves. By placing the control over their data into the hands of the students, it gives a sense of ownership and autonomy. In a world where the digital landscape is often shaped by distant entities, embracing solutions that prioritize students' control over their data is a declaration of digital self-determination. It allows students to decide how their data is handled, who has access, and how it is protected, ensuring their privacy and digital rights.
+
+Furthermore, an intriguing alternative to traditional cloud solutions lies in the embrace of
+.I "Free/Libre Software"
+solutions hosted on school premises. These platforms, often driven by a strong commitment to security and transparency, offer a robust alternative to the ambiguity of cloud computing. By hosting software on their own infrastructure, schools can exercise greater control and oversight over data, ensuring that privacy is protected and transparency is upheld.
+.I "Free/Libre Software"
+solutions also foster a collaborative spirit, allowing students and educators to engage in the development and customization of these tools, further advancing the principles of digital autonomy while challenging the prevailing status quo of centralized data storage.
+
+.HnS 1
+The Path to a More Sustainable and Secure Future
+.HnE
+
+The inefficiency of cloud computing and its environmental and privacy impacts call for a reevaluation of our data storage and computational practices. Here are some steps to consider:
+
+.ULS
+.LI
+Embrace Offline Storage: Consider using USB sticks or drives for all data storage and backup, reducing the need for data centers. USB sticks are not only more energy-efficient but also more secure.
+.LI
+Raise Awareness and Challenge the Status Quo: It's time to challenge the existing norms of data storage and data center practices. Advocate for transparency in cloud computing energy consumption, environmental impact, and data handling practices. Educate individuals, organizations, and educational institutions about making informed choices that protect their privacy, security, and the environment.
+.ULE
+
+
+.HnS 1
+The Need for Autonomy Environmental Consciousness
+.HnE
+
+Addressing the inefficiencies and the environmental and privacy costs of cloud computing necessitates a collective awakening to the impacts of our digital choices. It's a call to embrace heightened awareness and foster a resolute commitment to both sustainability and security. In the context of educational institutions entrusted with the sensitive data of students, the use of cloud services amplifies the need for unwavering security measures.
+
+It is crucial to recognize that this journey toward more responsible digital practices is fundamentally intertwined with the idea of student autonomy. In an age where technocratic and capitalistic forces seek to exert control and amass power over individuals, empowering students to have autonomy over their digital lives becomes a form of resistance.
+
+As we navigate the complex landscape of the digital realm, the imperative becomes clear: the choices we make today resonate in the data-driven world of tomorrow, where a sustainable, more secure, and more transparent future is not just a vision but a collective commitment. This path to change is not solitary but shared, underpinned by the understanding that in our interconnected digital age, the sum of individual actions has the power to reshape the collective destiny. By adopting practices that champion privacy and sustainability, we lay the foundation for a more harmonious digital coexistence, where the ethical handling of data is not just a choice but an obligation. As we confront the challenges of our digital era, we usher in a future where the digital realm aligns with our values.
+
+While the choice to opt for offline data storage like USB sticks may seem like a small shift in practice, it carries significant implications. It challenges the prevailing narrative of constant connectivity and data centralization, opting instead for local control and autonomy. In these choices lie the seeds of a digital revolution, one that prioritizes sustainability, security, privacy, and individual empowerment. As we journey into this future, let us remember that even the smallest actions can collectively reshape the digital landscape and pave the way for a more responsible and ethical digital world.
diff --git a/noxz.tech/articles/the_liberation_of_information/.assemble b/noxz.tech/articles/the_liberation_of_information/.assemble
@@ -0,0 +1,3 @@
+index.html
+gate.png
+sea.png
diff --git a/noxz.tech/articles/the_liberation_of_information/.buildignore b/noxz.tech/articles/the_liberation_of_information/.buildignore
diff --git a/noxz.tech/articles/the_liberation_of_information/.metadata b/noxz.tech/articles/the_liberation_of_information/.metadata
@@ -0,0 +1,6 @@
+.ds YEAR    2023
+.ds MONTH   October
+.ds DAY     22
+.ds DATE    \*[MONTH] \*[DAY], \*[YEAR]
+.ds TITLE   The liberation of information
+.ds AUTHOR  Chris Noxz
diff --git a/noxz.tech/articles/the_liberation_of_information/.tags b/noxz.tech/articles/the_liberation_of_information/.tags
@@ -0,0 +1,2 @@
+open access
+collaboration
diff --git a/noxz.tech/articles/the_liberation_of_information/gate.png b/noxz.tech/articles/the_liberation_of_information/gate.png
diff --git a/noxz.tech/articles/the_liberation_of_information/index.www b/noxz.tech/articles/the_liberation_of_information/index.www
@@ -0,0 +1,179 @@
+In this era of digital enlightenment, the liberation of information and the
+free exchange of knowledge stand as beacons of societal progress. We challenge
+the restrictive and proprietary models of proprietary solutions, paywalls, and
+patents that seek to shackle this newfound freedom. This article embarks on a
+journey that champions open information sharing and mutuality while daring to
+question the limitations of the closed, proprietary paradigm.
+
+.HnS 1
+The sweet embrace of open information sharing
+.HnE
+
+.PIMG sea.png
+
+.HnS 2
+1. Fostering Collaboration and Innovation
+.HnE
+
+.DLS
+.LI "Collective Wisdom Unleashed:"
+Open information sharing kindles the fire of collective wisdom. It allows the
+merging of diverse perspectives and unleashes a torrent of innovative
+solutions.
+
+.LI "A Symphony of Ideas:"
+The beauty of open sharing is its symphony of ideas that traverse boundaries,
+bringing forth a cacophony of inspiration and fresh insights.
+.DLE
+
+.HnS 2
+2. Education and Learning
+.HnE
+
+.DLS
+.LI "Knowledge Unshackled:"
+Open access to educational treasures liberates learning from the clutches of
+exclusivity, offering enlightenment to all, irrespective of their station in
+life.
+
+.LI "The Eternal Quest for Knowledge:"
+The path of lifelong learning is paved with freely accessible resources,
+inviting all to partake in the eternal quest for knowledge.
+.DLE
+
+.HnS 2
+3. Global Problem Solving
+.HnE
+
+.DLS
+.LI "Confronting Global Goliaths:"
+Open information sharing is our weapon against global adversaries like climate
+change, pandemics, poverty, systemic inequality, environmental degradation,
+corporate exploitation, government surveillance, and all sorts of injustices.
+It empowers collective, worldwide combat.
+
+.LI "Transparency as a Sword and Shield:"
+Open data and research foster transparency and serve as our shield against
+misinformation and our sword against unaccountability.
+.DLE
+
+.HnS 1
+The thorny path of proprietary solutions, paywalls, and patents
+.HnE
+
+.PIMG gate.png
+
+.HnS 2
+1. Protecting Intellectual Property
+.HnE
+
+.DLS
+.LI "The Siren's Song of Incentives:"
+While proprietary solutions and patents may lure with promises of innovation,
+their tune often drowns the cries for equitable access to knowledge.
+
+.LI "Knowledge's Hidden Lair:"
+These closed models erect impenetrable fortresses that obscure the treasures
+within, preventing those with a thirst for enlightenment from quenching it.
+.DLE
+
+.HnS 2
+2. Financial Hierarchies
+.HnE
+
+.DLS
+.LI "Profits Over People:"
+Proprietary models feed on revenue generated from licensing and subscription
+fees, creating a society where the temple of knowledge is only accessible to
+the privileged few.
+
+.LI "The Great Wall of Inequality:"
+Paywalls construct an insurmountable wall, segregating society into the
+informed elite and the information-deprived masses.
+.DLE
+
+.HnS 2
+3. Control and Security
+.HnE
+
+.DLS
+.LI "Fortresses of Secrecy:"
+Proprietary solutions offer control, but often that control is wielded as a
+weapon, guarding data within secret fortresses and stifling collaboration.
+
+.LI "The Monopoly's Grip:"
+Patents and proprietary solutions create monopolies, monopolies that stifle
+competition and raise the price of admission to the world of knowledge.
+.DLE
+
+.HnS 1
+The cry for freedom
+.HnE
+
+.DLS
+.LI "Equality of Access:"
+The fight for open information sharing and mutuality is a fight for equal
+access to knowledge, a rebellion that champions innovation and global
+collaboration.
+
+.LI "Redefining the Chains of Intellectual Property:"
+It's high time we question the chains of intellectual property and find a new
+equilibrium that nurtures innovation while tearing down the walls that keep
+knowledge imprisoned.
+
+.LI "A Revolution for Open Knowledge:"
+Advocates for open knowledge sharing are in the vanguard, pushing for reforms
+that champion open access to research, data, and educational resources.
+The revolution is on.
+.DLE
+
+The importance of information sharing and mutuality between peers is the
+cornerstone of progress. We challenge the closed, proprietary models of
+proprietary solutions, paywalls, and patents that shroud knowledge in secrecy.
+By advocating for openness and equal access, we make it our mission to ensure
+the benefits of shared knowledge are a birthright, not a privilege of the few.
+The torch of liberation is held high, and we march forward towards a more
+enlightened, free, and equitable world.
+
+As we conclude this journey through the landscapes of open information sharing
+and the limitations of proprietary solutions, paywalls, and patents, it's
+essential to reflect on the profound implications of this ongoing battle for
+the liberation of knowledge. The quest for an enlightened society where
+knowledge knows no boundaries is far from over. In fact, this article seeks to
+be more than just a conclusion; it's an invitation to look ahead, to grasp the
+immense potential, and to acknowledge the challenges that lie on the path to
+boundless knowledge.
+
+In a world where information is power, the choices we make about who holds that
+power and who has access to it shape the very essence of our society. The
+embrace of open information sharing and mutuality signifies a conscious
+decision to create a more equitable and innovative world. It’s a commitment to
+embrace the collective intelligence of humanity, unburdened by the chains of
+exclusivity.
+
+As we move forward, it is the duty of individuals, communities, and societies
+to push for reforms that champion open access to research, data, and
+educational resources. Our commitment to this vision is our beacon. We must
+challenge the status quo, question the paradigms that limit knowledge sharing,
+and create a future where learning is a birthright, innovation flourishes, and
+transparency prevails.
+
+We also encourage collaboration across borders and the sharing of ideas, not
+only in fields of science and academia but in all aspects of life. For it is
+through collaboration that we find solutions to the most pressing global
+challenges \(en challenges that do not discriminate based on borders or
+boundaries.
+
+In our journey to break down the walls that keep knowledge imprisoned, we must
+remember that progress requires time, dedication, and collective effort. The
+forces of resistance may be entrenched, but history has shown that the spirit
+of human curiosity, the desire for enlightenment, and the collective will of
+societies can drive profound change.
+
+With this, we extend an invitation to all who share the dream of an enlightened
+world, where knowledge flows freely, and where the boundless horizons of human
+potential can be explored without restraint. The battle for open knowledge is
+not only a struggle; it is also a celebration of the human spirit's quest for
+understanding, for innovation, and for a better world. Together, we can
+continue to push the boundaries of knowledge, creating a brighter and more
+equitable future for all.
diff --git a/noxz.tech/articles/the_liberation_of_information/sea.png b/noxz.tech/articles/the_liberation_of_information/sea.png
diff --git a/noxz.tech/dictionary/index.www b/noxz.tech/dictionary/index.www
@@ -95,7 +95,9 @@ Computers can change your life for the better
 .ULE
 
 The hacker ethic and its wider context can be associated with liberalism and
-anarchism.
+anarchism (see for example,
+.URL "//noxz.tech/articles/hacking-culture-and-capitalism/" \
+"Hacking Culture: a radical challenge to Capitalism, not its offspring" ).
 
 .LI "meritocracy:"
 .TAG "meritocracy"