While I had never problems using Crossover Office on Debian, a fresh install on a fresh Debian 12 Bookworm revealed that 32 bit dynamic libraries were missing -- I got a message like:
Can't exec "bin/wineloader": No such file or directory at cxoffice/bin/wine line 1310.
wine:error: unable to start 'cxoffice/bin/wineloader': No such file or directory
To fix that, run:
cxoffice/bin/cxfix --auto
That should add the missing 32 bit libraries.
To check in addition for any other missing libraries: In the running crossover GUI: Help -> System Information
to see if you are still missing any library. And indeed, still I needed to install apt install libcapi20-3 libosmesa6.
Just for the record: I have two different USB C to NVMe enclosures with different chipsets, one is crap, one is great:
Crap: Icy box IB-1817M-C31 with with JMicron JMS583 PCIe-USB Bridge Controller chipset: read stalls (not so much when writing, though), no S.M.A.R.T. support, no M.2 SATA support -- AVOID!
Sabrent EC-SNVE 10Gbps Tool-Free Enclosure with Realtek RTL9210 chipset: performant, with S.M.A.R.T. support, supports both M.2 SATA and NVMe, and the tool-free approach (i.e. no screws) is also nice, even though the case is smaller, it gets less hot than the other one (which could either mean that the heat transfer from the SSD to the case is bad, or that the bridge controller chipset gets less hot) -- RECOMMENDED!
Brynjólfur Stefánsson, Ásta Guðrún Helgadóttir, Martin Nizon-Deladoeuille, Helmut Neukirchen, Thomas Welsh: Understanding Trust in Authentication Methods for Icelandic Digital Public Services. IEEE SNAMS 2024: The 11th IEEE International Conference on Social Networks Analysis, Management and Security, IEEE, to appear 2024 or 2025. Preprint DOI: 10.48550/arXiv.2501.17548
Martin Nizon-Deladoeuille, Brynjólfur Stefánsson, Helmut Neukirchen, Thomas Welsh. Towards Supporting Penetration Testing Education with Large Language Models: an Evaluation and Comparison. IEEE SNAMS 2024: The 11th IEEE International Conference on Social Networks Analysis, Management and Security, IEEE, to appear 2024 or 2025. Preprint DOI: 10.48550/arXiv.2501.17539
The program lists only paper titles -- not authors nor presenters. Our student Brynjólfur Stefánsson presented both papers at the conference.
Has my user info (in the worst case: my password) been leaked? Look up who else owns your login data: https://haveibeenpwned.com
Note: if your data shows up there to have been leaked, then this is not your fault, but the fault of the website that was storing your data in an insecure manner and you should change your password at that website (also check whether the password has been leaked or only, e.g., your email adress). However, it is your fault if you use the same password for multiple websites: should your password leak from one website, criminals will try that password on other websites and will have success if you use the same password there. Use different passwords for different services. Even better: use multifactor authentication, i.e. not just a password (that can be easily leaked), but in addition something that can be less easily stolen, such as your phone: an authenticator app running on it, an SMS sent to your phone number, or the Icelandic digital ID on your SIM card.
An online quiz on how good you are at identifying phishing emails, i.e. emails trying to trick you into providing information, e.g. passwords: https://cybersecuritymonth.eu/quiz (Note: solutions not provided online -- you need to visit us to get hints where you were wrong and where you were right!)
A LEGO model of Iceland representing critical infrastructure that is subject to attacks. Each time, a service on our Internet-connected computer is attacked via the Internet from anywhere in the world, a light goes off. So when all Iceland turns dark in our Lego model, then you know that all of our services are currently being attacked at the same time. We use just a dummy sample server, but in fact, it could be your computer or a power plant that is attacked. True Blinkenlights - next time, we should do it using the lights in the glass front of Harpa concert hall.
A 3D scanner that scans the shape of your ear: used in CoE RAISE in order to find with AI out how the shape of your ear influences how you hear from different directions.
Quantum computing: a new piece to show, therefore no photos yet -- you really need to come and see!
On Friday, 27 September 2024, 10:45-12:15, we have in room SAGA - E (former Hotel Saga) a presentation (in Icelandic) on Cybersecurity at Menntakvika 2024, the University of Iceland education conference. See, the abstract titled "Net og gagnaöryggi í nútímasamfélagi" in the abstract collection. This is to raise cybersecurity awareness, see also the NCC-IS and ICEDEF projects.
On Tuesday 20.8.2023, 16:00, room Ada, in Gróska, 3rd floor, there will be an information meeting on the joint cybersecurity master's programme and cysec courses being offered at University of Iceland and Reykjavik University.
Professor of Computer Science and Software Engineering
Faculty of Industrial Engineering, Mechanical Engineering and Computer Science
Deputy head of faculty (Autumn 2024-Spring 2026)
University of Iceland
Department of Computer Science
Gróska building, 3rd floor (stairway A or B), room 306
Bjargargata 1
102 Reykjavik
Iceland
E-Mail: helmut at hi. is
(Encrypted e-mail welcome: my public PGP key, also available at key servers -- X.509 based S/MIME encryption possible on request.)