OnlyOffice announced the new 7.3.0 release for its desktop editors office suite one day ago.
For Linux users, the new release now use native dialog windows (e.g., file manager and print). And, it adds support for xdg-desktop-portal in the file dialog window, meaning better desktop integration for application installed as Flatpak and/or Snap packages.
This release also add a Quick Print button right beside the original print button. Instead of bringing to the print configuration page, it will directly send your entire document to the last selected or default printer.
For the Spreadsheet Editor, there’s new Watch Window under Formula tab, as well as new functions include TEXTBEFORE, TEXTAFTER, TEXTSPLIT, VSTACK, HSTACK, TOROW, TOCOL, WRAPROWS, WRAPCOLS, TAKE, DROP, CHOOSEROWS, CHOOSECOLS.
Advanced forms via Forms tab in DOCXF files -> Available fields and Manage Roles menu
SmartArt (e.g., List, Process, Cycle, Hierarchy, Matrix) under Insert tab.
Ability to password protect document while allowing filling forms, commenting, or tracking changes.
Ability to add links between several spreadsheets
New Date and time, Zip Code, Credit Card for creating forms.
Support for creating math equations in both Unicode and LaTeX syntax.
Show/hide left and right panel.
Ability to insert data from the XML Spreadsheet 2003 file
How to Install OnlyOffice Desktop Editors 7.3:
The office suite is available to install in Ubuntu Linux in 3 different package formats: Snap, Deb, and Flatpak. Choose either one that you prefer.
Snap is an universal package format that runs in sandbox. Ubuntu 20.04 and higher users can simply search for and install OnlyOffice as Snap from Ubuntu Software.
The snap automatically receive updates, though the package at the moment of writing is still at version 7.2.1.
ONLYOFFICE Snap in Ubuntu Software
Deb is the native package format for Debian/Ubuntu and their based Linux systems. OnlyOffice provides the .deb package along with RPM, EXE, MSI, and DMG packages for downloading at the github releases page:
The first point release of Linux Mint 21 is out! Code-name ‘Vera’, Kernel 5.15, Ubuntu 22.04 package base, and Cinnamon 5.6, MATE 1.26, XFCE 4.16 for each desktop edition.
The default theme for mouse pointer in Linux Mint 21.1 now is Bibata-Modern-Classic, a modern black and rounded edge bibata cursors. Though, user can easily choose another one from System Settings -> Themes. For those like it, the cursor theme is available in the github page.
New default Bibata Modern Classic cursor theme
The default icon theme Mint-Y now has always yellow folders with different accent colors. The previous default icons are now Mint-Y-Legacy available in Themes selection page. The accent colors are also revamped in this release, compare to the legacy ones they look more vibrant.
New default Icons
The release also improved the Flatpak package format support. Update Manager utility can now update Flatpak applications as well as the run-time libraries just like classic .deb packages. And, Software Manager now provides an option to choose between Flatpak and Deb if an app is available to install in both formats.
For 3rd repositories, Linux Mint 21.1 now follows Debian’s (rather than Ubuntu’s) new policy! When adding an Ubuntu PPA, it automatically install the key into ‘/etc/apt/keyrings‘ and adds signed-by section in source file, so the GPG key can only be used for that PPA repository.
Other changes in Linux Mint 21.1 include:
Hide Home, Computer, Trash and Network icons from desktop by default.
New sounds come from Material Design V2
New icons pre-installed: Breeze, Papirus, Numix, Yaru
Replace ‘Show Desktop’ panel applet with Microsoft Window style button in bottom right corner.
Add dummy hardware device, dummy packages in Drive Manager for debugging.
Add right-click menu option to verify ISO file checksum (sha256sum).
Get Linux Mint 21.1:
For the release note, as well as download link for the new ISO images, go to Linux Mint website:
Linux is a free, open-source operating system. You don’t have to pay anything to use it, and it’s not owned by any particular business. Due to the rules of its license agreement with users, Apple Inc.’s commercially produced Mac OS X is offered free of charge. The Unix operating system (UNIX), which was created by AT&T Bell Laboratories in 1969 as a substitute for Multics, is the basis for the name (which became UNIX System V).
Linux is an Open Source and Free to Use
Linus Torvalds released the first version of the free operating system known as Linux in the year 1991. It has since grown to become one of the most well-known and commonly used operating systems in the world; it is believed that 100 million computers throughout the world use Linux.
Linux, much like Android on mobile devices, is widely used by both consumers and by businesses. Many people believe that Linux is more secure than Windows because it doesn’t use proprietary software, and this belief is supported by the fact that Linux is widely used (e.g., Adobe Flash).
Mac is a Commercial Product
Mac is a brand-name product. Most customers must pay $129/year to start using their computers because MacOS is commercial software, and there aren’t many free alternatives you can get right now. On the other hand, Linux is open-source and free. This implies that you can utilize it without having to pay anything or sacrificing your privacy.
As Apple and Microsoft do not own Linux, this also implies that you do not require their permission or any other special license in order to install Linux on your computer (or at least not anymore).
Linux is More Secure Than Mac
Linux is open source; thus it’s available for usage and modification without charge. You are free to alter any aspect of it as you see fit or even come up with your own version. Compared to macOS, which is controlled entirely by a single developer, this gives the system a lot more flexibility and customization options (so there are no customizations).
Linux can be the best option for you if you’re looking for a low-cost solution!
Despite recent fixes by Apple itself, security flaws like viruses and malware attacks exist in both Windows and MacOSX today. They are still inferior to their competitors because GNU/Linux relies on community support rather than proprietary systems, which means that if something goes wrong, someone else can fix it quickly without needing to have access to first-hand information like Microsoft does when attempting to compete.
Why You Need to Pay for Mac
Mac is a for-profit product, so you must pay for it.
Upgrades and security updates must be paid for.
Using a Mac is simple.
The Mac is simple to use, making it a great option for non-techies and beginners alike. It is more approachable for new users because it is less intimidating than other operating systems.
Why Linux is Better than Mac
Linux is costless.
Since Mac is not open source, you cannot alter the code and make improvements on your own. Because of this, consumers may find it more challenging to modify their computers or run applications on their own computers.
Due to the fact that Macs are still less prevalent in business environments, they are more expensive than Linux-based systems (although they have become increasingly popular with consumers).
There are not many hardware or software requirements, making setup simple, like the use of a VPN. Linux supports good VPN software and assists in the installation process more than Mac because some VPNs are not supported by Mac. But in the case of Linux, as it is open source, therefore it easily digests all types of VPNs.
Numerous Linux distributions are available, each with special features and advantages for both consumers and developers.
Compared to Mac, Linux has several advantages. The advantages of Linux over Mac are numerous. One of the key causes is that Linux is open source, which implies that anyone can modify it, and it is free to do so. It is also available on more platforms than Mac, which is another factor. Last but not least, Linux is quite configurable, allowing you to create your own desktop environment with just a few mouse clicks as opposed to spending hours setting up a new operating system with numerous settings.
Running Ubuntu 22.04 with the default Wayland session? You can switch your web browser’s backend to get even faster and smoother experience.
Firefox, Google Chrome and Chromium based web browsers do have native Wayland support, but they still use X11 as backend in Ubuntu desktop.
Since Ubuntu 22.04 by default logs into Wayland session, user can also change the web browser’s backend to get faster and smoother browsing experiences. I didn’t run any benchmark. But after switching to Wayland, my browser now has:
obviously better touchpad scrolling
2-finger spread/pinch gestures to zoom in/out
Enable Wayland for Chrome/Chromium
For Google Chrome, Chromium and their based web browsers, e.g., Edge, Vivaldi, just type chrome://flags/ in address bar and hit Enter.
When the page opens, search for Preferred Ozone platform and use the dropdown menu to set it value to “Wayland“. Finally, click “Relaunch” button to apply change by restarting the web browser.
Chrome enable wayland
Native Wayland for Firefox
For firefox web browser, user need to edit the “/etc/environment” config file.
First, press Ctrl+Alt+T on keyboard to open terminal. When it opens, run command to open the file via gedit text editor:
sudo gedit /etc/environment
Replace gedit with your favorite text editor, such as gnome-text-editor for next Ubuntu 22.10 & Fedora.
When the file opens in text editor, just add a new line:
As the screenshot shows, you can also add more rules into this config file:
MUTTER_DEBUG_ENABLE_ATOMIC_KMS=0 – to fix a slightly laggy, slightly sloppy mouse response issue.
CLUTTER_PAINT=disable-dynamic-max-render-time to get a smoother frame rate.
After saving the changes in the config file, restart your computer to take effect!
Before we even try to answer the question of better security, let us take a quick look at Blockchain technology, what it was designed to do, and for whom. For starters, a blockchain acts as a database that stores information in a digital format. It is a ledger shared within a computer network’s nodes.
Blockchain can maintain a secure and decentralized way of recording transactions and data without needing a third party. That is why it is popular in cryptocurrency systems; in fact, it is vital because there would be no anonymity for crypto users without it. DAO companies like Bitdao and Uniswap also rely upon blockchain technology to function.
How does it work
A blockchain collects its data into blocks (hence the name) and links them together as each block reaches its maximum capacity. The chain of data formed once all the blocks are linked is called Blockchain. The data entered into these blocks is irreversible and permanently recorded but can be viewed and distributed by anyone. This is vital in cryptocurrency transactions as nobody can alter or delete a transaction once it has been recorded on the block.
In a business scenario, Blockchain works precisely the same way. Take, for example, an insurance company that records client-sensitive data, transactions, and other third-party information. All this information is stored on a company network and backed up on a cloud. In the event of hacking, all that information is compromised, as was seen in the Experian data leak. Had all that data been stored on a blockchain, it would have been nearly impossible to hack. And if the hack had been attempted, the company would have received a notification quickly before it got to the extent it got to.
Blockchain is for people who don’t trust other people but still need to share information with them; they can share data in a secure tamperproof way. If data is placed on a blockchain network, whoever accesses it can be traced in real-time, so whether they were distributing data or just viewing traceability is easy. An example is when hackers hack exchange wallets where people store their cryptocurrency. The hackers’ identity is untraceable, but one can follow the Bitcoin trail. So wherever the hacker stores or spends that stolen bitcoin, you can find it.
In the business context, permissioned blockchains are private blockchains that run on closed systems and require an invitation to join. This can be useful within a company when you don’t want only a select group of employees to access specific data. It also gives management more control over who they give access to. Ripple is an example of a permissioned Blockchain mainly used by the banking industry.
In this age of digitization, the word security has become subjective. What we thought of as secure and impenetrable five years ago is no longer that. Blockchain is high up on the list of digital security even though it’s not impervious to attacks. The blocks on the Blockchain each contain their hash (individual cryptographic print). Once a block has been completed and added to the chain, it is impossible to go back and alter any data on that block.
If anyone attempted to change a node on the chain, it would require them to change that node’s hash, which would cause misalignment with all the other nodes on the chain. The other nodes would recognize this false node and cast it out as illegitimate, and this is called the consensus protocol. For such a hack or breach to be successful, the hacker would have to change 51% or more of the blocks on the chain, which would be very expensive and time-consuming.
Benefits of Using Blockchain
Authentication of Software Interactions
The ability to authenticate software updates and patches can prevent cybercrime, and organizations can use blockchain hashing to verify updates and downloads from developers. This can also help mitigate supply chain attacks
Any data stored on the Blockchain cannot be altered or deleted; this function is significant for cross-border data distribution, as in the case of medical records and personal information captured in one country and used in another.
Maintaining the networks that Blockchain requires to function can be costly and run well into the millions.
While the system is virtually impenetrable because it is decentralized, hackers have developed advanced ways of attacking and defrauding the system over the years. In 2019, hackers attacked twelve crypto exchanges.
To answer the question, yes, Blockchain does offer better digital security. The level of security offered by Blockchain is also dependent on what your needs are. Blockchain offers a different kind of security for bitcoin transactions versus client data storage for an international company.
It is important to note that it is not immune to hacking attempts. So it requires the user/owner of the data to be vigilant in using the Blockchain.
Always store your keys safely; once you lose your key, you lose access to your cryptocurrency or data.
Scrutinise all e-mails and protect yourself against phishing attempts to get your personal information to hack your account
Though convenient, we advise against storing your bitcoin on an exchange as these are more susceptible to hacking than wallets.
Cybersecurity has never been a low-stress field. The industry attracts dedicated, highly-skilled perfectionists who are all too willing to shoulder the burden of a company’s cybersecurity without complaint. Yet, increased threats of ransomware and cyberattacks are creating an anxiety filled workplace. The current technological skills gap means there is frequently too much work for too few people. Stress, working overtime, missing holidays and birthdays, it’s all too often considered ‘part of the job.’ 9 in 10 CISOs said they were under high or moderate levels of stress; COVID only amplified this. 80% of information security personnel say they’re dealing with more stress in the wake of the pandemic, however the impacts are rarely talked about. 40% of CISO respondents said that stress levels impacted their relationship with their partners or children. As stress mounts for CISO’s, their ability to focus on their job, remaining calm and aware of potential threats, decreases. The Zensory is the first work-productivity app designed for professionals in high-stress fields, using multi-faceted tools to decrease anxiety and promote discipline in their work.
Stress isn’t some new phenomena, it’s a primordial response, an activation of the amygdala which triggers a hunter-gatherer fight or flight instinct designed to keep you alive. It was quite helpful back when threats were life or death. Now we are more likely to experience low-level stress, where a threat comes from a mistaken line of code or an untrained employee opening a suspicious link. This is chronic low-level stress, where the stress-centre of the brain is kept running like a car motor, and has knock-on effects on focus and productivity. Chronic low-level stress means the amygdala gets all the attention in your brain and prevents your prefrontal cortex, the part of your brain used for high-level thinking and creativity, from functioning properly and focusing at work. As this prefrontal cortex fails to get adequate attention, you lose focus at work, leading to stress about managing daily tasks, leading to less focus at work.
In CyberSecurity, many professionals self-medicate, the number growing in recent years. As professionals lean on these unhealthy habits, they lose their ability to focus, to fall into the flow state where their best work is done, and allow a vicious cycle of stress and coping to continue. The Zensory is the first step in hacking your habits to help rather than harm you.
The Zensory has been taking the lead in helping people hack their habits by using binaural beats, touchpads, naturescapes, movements, own brand scents and breathwork to create a focused environment and boost creativity. All with the goal of getting you into your flow state so that you can increase your work productivity and de-stress at your job. With 27 years of experience working with the cybersecurity industry, Yvonne Eskenzi is intimately familiar with the cycle of stress, bad habits and distraction that cybersecurity leaders are experiencing. Combining this experience with her daughter Jasmine’s background in healthcare, they founded The Zensory app to redirect the tendencies of professionals within high-stress jobs. Yvonne and Jasmine discovered that by including a plethora of research-backed tools and guidance to tackle their work and distractions head on, people could individualise their new work ritual and revolutionise their habits. Already,
the app has worked wonders for C-level executives and surgeons in the NHS. Ben Smith, the serial entrepreneur, said that The Zensory helped him do two weeks worth of work in two hours. Others on the App Store are saying that The Zensory is unique amongst other apps in being intuitive to use and actually giving them the results they are looking for.
Yvonne and Jasmine started their journey developing The Zensory over the pandemic, when the world was trapped in their homes. They noticed that their creativity and focus was being lost as they succumbed to daily distractions. Jasmine decided to understand why achieving a flow-state was so hard to find. She looked at over 200 research papers, talked to neuroscientists, composers, and authors of renowned self-help books to understand the methodologies and biological underpinnings of stress and focus. One immediate striking element the research indicated was that music was not an effective way to tune into one’s work. It may be a ritual for people, but it is often accompanied by highs and lows, breaks, and lyrics, which all can prove distracting from deep work. Despite this, people nearly always want some kind of auditory stimulus, whether it’s just part of their ritual or to actually block out other distractions. Instead of this, Jasmine decided to use binaural beats which have been increasingly shown to replicate brain waves states of alpha, beta, gamma and more, that were shown to boost their focus, relaxation and creativity.
Binaural beats are auditory illusions. Two different sounds are played into either ear using headphones at different frequencies. Your mind hears this and
instead of either frequency it imagines it is listening to the difference between the two frequencies. This means that, instead of actively listening to music and becoming distracted by its high and lows, you are subconsciously stimulating optimal brain frequencies to improve your mood whenever you want to. On their own, these beats can be grating rather than focusing for some people. But, by layering over calm, rhythmic music and relaxing naturescapes, The Zensory creates an experience which removes anxiety from people in even the most stressful jobs.
The experience is not limited to sound. The Zensory also helps you hack your touch, smell, and taste as well, offering guided programs for low-intensity stretching to boost creativity and recommendations for essential oils, foods, and pressure points to help you relax and zone out at the end of the day. The Zensory’s main focus for most is its pre-made programs designed to allow you to either tune in to your work or tune out when you need to relax. These programs all feature binaural beats to get your brain stimulated and include movement exercises you can do while you work along with breathing exercises and touchpads to de-stress. All of these programs are designed to be implemented into one’s work schedule, going on for anywhere from 3-20 minutes and also incorporating a short 3 minute rest period. The best thing is, despite its stellar reviews and constant additions, The Zensory is still free! So if you’re curious about the unparalleled power of tapping into your senses, give it a go here.
The Vim editor is like an ocean – wonderful and joyful to be in, but there will always be things you don’t know.
While you cannot discover the ocean alone, you can always learn from others’ experiences.
I am sharing a few tips in this article that will help you use Vim like a pro.
I use them regularly and I have seen expert Vim users sharing them in various communities.
You should add them to your vimrc file, wherever applicable. You’ll have a better and smoother experience using the ever-versatile Vim editor. Trust me on this.
1: Always use the built-in help
I can not stress this enough. The biggest and least used tip is “RTFM” (Read the f**king manual).
Obviously, there is the Internet, humanity’s biggest collective resource for untapped knowledge, but what happens when Stack Overflow goes down?
Getting yourself habituated to Vim’s built-in help is the biggest favour you can do for yourself.
The syntax for looking at Vim’s internal help is as follows:
Help regarding the ‘:w’ command
Help regarding ‘j’ key in context to Normal mode
Help about using ‘J’ key in context to Visual mode
Help about using ‘Esc’ key in context to Insert mode
Help about search pattern ‘n’
2: Open as normal user, save as root user
In my memory of editing system files, you can easily forget adding sudo before editing a file in Vim. This opens a file in the ‘readonly’ mode. Meaning you can not write anything to it.
But you might have made some significant changes. And there might be no way of remembering every single edit you made. Hence, exiting with unsaved work is not an option.
In those scenarios, type the following command in Vim:
:w !sudo tee %
Once you type this command, you will be asked for the password for sudo command. Enter that, and your changes will be saved.
You should use the sudoedit command instead of sudo vim for editing files that require superuser privilages.
Let us break this down and understand what is happening here…
:w – This is the write command. Since no argument is given, Vim will write the whole file to standard output.
!sudo – Run the ‘sudo’ command as a shell command, not as a Vim command
tee – The ‘tee’ command is used to read from standard input and write it either to standard output or to a file
% – Vim substitutes this by the name of the current file that you are editing.
The :w command writes the whole file to STDOUT (standard output). Then, we use the sudo command (since what we are editing is a system file after all) to obtain temporary privilege.
The percent sign (%) represents our filename and the tee command takes Vim’s output from STDOUT and writes it to the % file.
This essentially works out to <Vim's STDOUT> | sudo tee /etc/ssh/sshd_config. A bit complex initially, but so is Vim 😉
3: Convert all spaces to tabs and vice-a-versa
We all have a preference for using either tabs or spaces over the other.
But what if you are editing an indented text file contradicting your preference?
3.1: Covert all spaces to tabs
When the current file is intended to use spaces, and you wish to convert them to tabs, there are two Vim commands that you need to run.
These two commands are as follows:
Doing so will convert all spaces to their equivalent of tabs. If the document uses two spaces as indentation width, they will be converted to 1 tab. If four spaces are used as a single indentation width, those four tabs will be replaced with one tab character.
3.2: Convert all tabs to spaces
If the file you are editing is intended with tabs and you want to convert the tabs to spaces, there are four Vim commands you must run.
The first command (expandtab) tells Vim to expand tabs with spaces. The second command (tabstop) command how many spaces are used as one ‘indentation block’.
In our case, we are defining “1 tab = 4 spaces”. The shiftwidth command is used to control indentation when using >> operator, this too, is set to 4 spaces.
Finally, the retab command converts all tabs (that are used for indentation) to spaces.
4: Indent all lines
Wrongly indented lines can create havoc for Python and YAML programs.
To indent alllines, press the gg key to reach the top. Then press the = key to denote ‘indent’ and finally press the G key to denote ‘last line’.
Repeat with me; it is gg=G key combination to indent all lines.
This will automatically indent (to the best of Vim’s ability) all lines from the first line to the last line.
Below is a demonstration where I indent Rust code using the :gg=G command.
As you can see (from this limited preview), all the lines are correctly indented.
The icing is that lines do not have to be wrongly indented to use Vim’s indentation.
5: Preserve indentation when you paste code
Admit it; we all have copy pasted code from the internet at least once. But what to do when the indentation gets messed up when you paste it?
To avoid that, add the following line to your .vimrc file:
With this change to your vimrc file, press the F2 key before you paste code. Doing so will ensure that your code gets pasted with the correct indentation.
6: Start writing with the correct indent depth
This is a handy trick that I learned only recently. Suppose you are on the first column of a line, but what you write needs to be indented.
How do you do that in a smart way? Without pressing tabs/spaces?
The answer is to use the S key in Normal mode.
When you are on the first column of a line, enter the Normal mode by pressing Esc key. Then press the S (uppercase) key. This will move your cursor to the appropriate indent depth and automatically enter into Insert mode so that you can start typing.
You can see, in this demonstration, my cursor was on the first column, and by pressing the S key, the cursor moved to the correct indent depth and Vim switched from Normal mode to Insert mode.
7: Show diff before saving the file
We have all been there. “I modified this file, but don’t know what I changed and now I am afraid the change will cause unexpected issues down the road.”
The remedy to this problem is to view the difference between the buffer and the file.
To do so, execute the following command in Vim itself:
:w !diff % -
Let’s break this down so you understand what is happening…
:w is the Vim command to save/write. In this particular scenario, where no file name is specified in the command, the output is written to the STDIN (standard input) file.
:!<command> is the syntax for executing a shell command. In our case, we are running the diff command in our shell.
% represents the name of the current file that is unmodified. Try this with :!echo %.
- is the STDIN file for the diff command.
So, this command first writes all the [unsaved] content to the STDIN file. Then the diff command reads the current file (%) and comparing it against the STDIN (-) file.
This command roughly equates to this shell command -> diff <original-file> <Vim's STDOUT>.
8: Show spelling mistakes
If you have been using only Vim ever since the beginning, good for you! But some people are also introduced to word processing software like Microsoft Word.
It has a feature (or a curse, for people with non-English names), where the spell-checker of MS Word places a red squiggly line under a misspelled word.
That feature might appear to be “missing” from Vim. Well, not exactly.
Vim has a spell checker built into it. You can enable it using the following command:
Upon doing this, you might see misspelled words get highlighted. The way they are highlighted depends on your Vim color scheme. I get a white underline under misspelled words here.
Your mileage may vary with the method of highlighting a word.
To make this the default Vim behaviour, you can add the following line to your .vimrc file:
There are two methods to indicate the line numbers. One is Absolute line numbering. In this, you get the absolute number for each line, just like any other code editor or IDE.
The second is Relative line numbering. In this, the current line gets the number ‘0’ and every other line gets a relative number in context to the line on which the cursor is.
If you liked both, but had to make a tough choice of choosing one over the other, you are not alone. But you also don’t have to choose one over the other. You can have both!
You can enable “Hybrid line numbering” in Vim by adding the following line to your .vimrc:
set number relativenumber
This will show the absolute line number on the line with your cursor and relative line numbers for other lines.
Below is a screenshot demonstrating how it Hybrid line numbering works:
Currently, my cursor is at the 44th line, so that line has the absolute line number. But the lines above and below my cursor have a relative number with respect to the line which has the cursor.
10: Open Vim with the cursor on a particular line
There might have been times in your past when you wanted to open Vim with the cursor set to a particular line instead of the first line.
This can be done by making use of the +linenum option. Below is the syntax to do so:
vim +linenum FILE
Replace the word linenum with an actual number.
Here you can see that I open the /etc/ssh/sshd_config file with my cursor on the lines 20 and 50. That was done using the +linenum option.
11: Use readable color schemes
When it comes to using color schemes, people often choose the ones that they find most attractive or aethetically pleasing. But when you Vim as a code editor cum IDE, it is nice to give up some eye candy in favour of getting colorschemes with better visual guides.
A good colorscheme only looks good, but an excellent colorscheme helps you easily identify keywords, variables and other identifiers with the help of colors.
A few of my personal favorite colorschemes are as follows: