r434380 made massive changes to Qt4 and Qt5 in FreeBSD. Sadly, there are no instructions on how to upgrade an existing system. The changes to ports/head/UPDATING didn’t help at all. Here are the notes I made while upgrading my laptop running stable/11.
To successfully install misc/qtchooser and upgrade the remaining Qt4 and Qt5 ports, you need to recursively uninstall
At some point you to need to upgrade devel/qt5-core before everything else, e.g. portupgrade -fpv devel/qt5-core.
Our program, who art in memory,
called by thy name;
thy operating system run;
thy function be done at runtime
as it was in development.
Give us this day our daily output.
and forgive us our code duplication,
as we forgive those who
duplicate code against us.
And lead us not in frustration,
but deliver us from GOTOs.
For thine is the algorithm,
the computation and the solution,
looping forever and ever.
Earlier this week, a student walked into my office with his Dell XPS 15 9550 in hand. Sometimes his computer would behave, and sometimes, during heavy load, it would die with a CRITICAL_PROCESS_DIED BSOD. Dell’s own recovery DVD image was unable to restore the computer to a working order. The support personnel at Dell suggested using Microsoft’s Media Creation Tool to download a Windows 10 ISO image. Burning the ISO image to a DVD and reinstalling Windows made the computer runnable to some degree. As soon as we installed the WiFi driver, we got that dreaded CRITICAL_PROCESS_DIED BSOD again. Googling for “Dell XPS 15 9550 CRITICAL_PROCESS_DIED” gave results about the NVMe disk device driver being a possible culprit. This issue has existed for almost a year and are hardly isolated to a few instances. Maybe the XPS 15 9550 model suffers from poor choice of hardware components or bad hardware design.
Kryptowire announced on 2016-11-15 the discovery of malware in Android-based smart phones sold by, among others, Amazon US and BestBuy. The malware was allegedly created by Shanghai ADUPS Technology Co., Ltd. Kryptowire claims the malware sends all your text messages, all your contacts, all your call history, etc., to the domain names listed below. The ADUPS company issued a statement claiming its services are simply spam countermeasures.
Kryptowire claims these domain names resolved to the IP address 22.214.171.124.
Today, 2 days later, those domain names resolves to the IP address 126.96.36.199. The domain name rebootv5.adsunflower.com still resolves to the IP address 188.8.131.52. Be sure to adjust your ACLs if you have entered the previously known IP addresses.
A student came to my office today. His browser showed our fronter.com instance protected by a peculiar SSL certificate issued by royalvulkan.com. The norm for fronter.com instances are SSL certificates issued by COMODO CA Limited. The intrusive SSL certificate has a validity period spanning from 1996 to 2056, which is very odd. The certificate probably has a wildcard Common Name, causing it to cover all conceiveable hostnames. I have no idea how this certificate got introduced into our student’s computer. Luckily, Google Chrome spotted the faulty certificate and the student was wise enough to come and see me. Shortly after, I had to leave the student and go to class. I’ll try and update this post if he shows up again with the same problem.
I pondered this issue during the weekend. Maybe the student has somehow activated the proxy setting, sending all his (sensitive) internet traffic to an unknown third party.