![]() |
Web browsers do too much.
Many of their features can be replaced with specialized software which does the job better.
![]() |
Web browsers do too much.
Many of their features can be replaced with specialized software which does the job better.
![]() |
Software > Web browsers >
(on Wikipedia)
Linux > http://www.palemoon.org/
http://www.palemoon.org/
A web browser which is essentially a fork of Firefox. Pale Moon keeps the simpler UI before the astonishingly terrible changes Firefox made.
A very good browser. Newer addons targeting the latest Firefox which are addicted to its new interface will not work with Pale Moon, since Pale Moon lacks that interface. Older addons or proper UI-agnostic addons will work fine.
Software >
(on Wikipedia)
http://openscad.org/
The Programmers Solid 3D CAD Modeller
In general, this is a wonderful program. A great editor, and it’s quite easy to use.
Unfortunately, it really is for programmers. While I can muddle through everything, I’m not a programmer so it’s extremely time consuming for me to make anything.
![]() |
Software > Animation, Video editing >
(on Wikipedia)
(on Steam)
https://www.blender.org/
A Free and open source 3d creation suite and video editor.
3d editing: Said to be very difficult to use, and it is. There is an argument that in mastering it one gains a huge set of capabilities with one tool. I was unable to get that far.
Video editing: Defaults are stupid and features are missing. Maybe it’ll be passable in a few years.
It has a portable zip, with no install required. Yay!
(on Wikipedia)
https://wiki.bitmessage.org/Main_Page
A secure communications tool which sends messages through a network of users which it doesn’t need to trust.
It can be thought of like Tor for email.
TODO – add additional notes
![]() |
(on Wikipedia)
https://www.ecryptfs.org/
A cryptographic filesystem.
A fantastic concept and program which I used heavily for a long time across multiple Linux distributions.
Be aware that attacks on people, hardware and implementation are the go-to methods for defeating encryption. Some points:
eCryptfs-mount.sh is my helper script.
![]() |
(on Wikipedia)
https://distrowatch.com/table.php?distribution=vector
was vectorlinux.com
Abandoned
Internet > Remote controlling software >
SSH being enabled is also known as having “shell access” enabled. It’s generally considered a risk for various reasons, most notably because runaway processes can be an issue.
Secure Shell