REGINA – Teepees came down at an Indigenous protest camp on the grounds of the Saskatchewan legislature on Monday, and protesters say more will be brought down on Tuesday.The Saskatchewan Coalition Against Racism said in an email late Monday that teepees would be coming down throughout the day Tuesday, and there would be a round dance for supporters and campers at sunset.On Friday, a judge ordered that the Justice For Our Stolen Children Camp be dismantled after the government applied for a court-ordered eviction.The campers have been protesting racial injustice and the disproportionate number of Indigenous children in care since late February.There had been 15 teepees in the camp at one point, but that number was down to 10 by Monday morning. At least two of the teepees came down after the court order, while others were taken down for the annual Treaty 4 Gathering taking place in Fort Qu’Appelle, Sask., this week.Regina police spokeswoman Elizabeth Popowich said in an email earlier Monday that the department had been in talks with the province and protesters, and Chief Evan Bray “expects a resolution in the near future.”No deadline was specified in Justice Ysanne Wilkinson’s order to take the camp down.Protester Richelle Dubois said Monday it was “disheartening” to see the number of teepees shrink.“It shows the province’s true colours and how they feel about First Nation children and communities,” she said.Robyn Pitawanakwat, a spokeswoman for the camp, said earlier in the day that protesters were still undecided about where to go from here, and they held several meetings over the weekend to discuss their options.“We’re hopeful — hopeful that there’s still a future for our cause and there’s still a future for our children,” Dubois said.Lawyer Dan LeBlanc, who represents the protesters, wasn’t immediately available for comment. A spokesperson for the provincial government declined to comment further on the future of the camp.Pitawanakwat said spirits have been good at the camp and people have been united since the court order. She said the focus should be on the issues they’ve brought forward, rather than bylaws and permissions.— Follow @RyanBMcKenna on Twitter
What’s new in the hair trend this winter? Are you planning to let your hair flow the same boring way? Experts suggest going for two top knots or a French braid instead of tying your hair in a boring bun for a fun party. Here’s how you can try some stylish hairdos:French braid: Begin with using a dry shampoo on your lengths and ends to help create texture. Take a centre parting and braid your hair on both sides using the French braid technique. Continue braiding till you reach the nape area and secure it with rubber bands. Open up the braids a little bit and spray finishing spray for hold. Also Read – Add new books to your shelfCentre-parted wavy hair:Spray a prepping product on the roots, lengths and ends to give thickness and volume. Blast dry the hair so that the product is worked into the hair. Use a tong and curl the ends using big vertical sections. Open up the curls and use a hairspray for hold and shine.Low side bun: Use volumising spray on the lengths and ends for body and texture. Work the product into the hair with a brush and dryer. Take a side parting and tie your hair into a low ponytail at the nape area and secure it with a rubber band. Use a curling tong and tong the hair that is in the ponytail to create some movement. Twist the hair into a low bun and pin it up with bobby pins. Pull out a few strands and finish by applying a hairspray for added shine. Also Read – Over 2 hours screen time daily will make your kids impulsiveTwo top knots:Apply a smoothing cream on your lengths and ends for a soft and smooth texture. Take a centre parting and divide the hair into two equal parts. Tie two high ponytails of both sides of the parting and secure them with rubber bands. Twist the hair in the ponytail and wrap it around to look like a top knot. Secure it with pins. Repeat the same on both sides.Messy ponytail: To achieve the messy ponytail, apply a texturising spray to the lengths and end. Tie a high pony and secure it with a rubber band. Put some loose pieces for a messy effect and finish by spraying a shine hairspray.
Yesterday a remote code execution bug was found in the APT high-level package manager used by Debian, Ubuntu, and other related Linux distributions. Max Justicz, the security researcher who discovered the bug, says that the bug “allows a network man-in-the-middle (or a malicious package mirror) to execute arbitrary code as root on a machine installing any package.” Justicz’s blog post states that the vulnerable versions of APT don’t properly sanitize certain parameters during HTTP redirects. An attacker can take advantage of this and perform a remote man-in-the-middle attack to inject malicious content, thus tricking the system to install certain altered packages. HTTP redirects while using apt-get command help Linux machines to automatically request packages from an appropriate mirror server when other servers are unavailable. If the first server fails, it returns the location of the next server from where the client should request the package. Justicz has also demonstrated this man-in-the-middle attack in a short video: Justicz told The Hacker News that a malicious actor intercepting HTTP traffic between APT utility and a mirror server, or just a malicious mirror, could execute arbitrary code on the targeted system with the highest level of privileges, i.e. root. He further adds, “You can completely replace the requested package, as in my proof of concept. You could substitute a modified package as well if you wanted to”. The APT is also used by major Linux distributions like Debian and Ubuntu, who have also acknowledged and released security patches for this vulnerability. Hacker News also points how this flaw comes around the time when cybersecurity experts are fighting over Twitter, in favor of not using HTTPS and suggesting software developers to rely on signature-based package verification since the APT on Linux also does the same. They further add that the APT exploitation could have been mitigated if the software download manager was strictly using HTTPS to communicate securely. The developers of APT have released version 1.4.9 that fixes the issue. The bug has also been fixed in APT 1.2.29ubuntu0.1, 1.7.0ubuntu0.1, 1.0.1ubuntu2.19, and 1.6.6ubuntu0.1 packages, as well as in APT 1.4.9 for the Debian distribution. You can head over to Max Justicz official blog for more insights on this news. Read Next Kali Linux 2018 for testing and maintaining Windows security – Wolf Halton and Bo Weaver [Interview] Black Hat hackers used IPMI cards to launch JungleSec Ransomware, affects most of the Linux serversHomebrew 1.9.0 released with periodic brew cleanup, beta support for Linux, Windows and much more!