#Commandline
Explore tagged Tumblr posts
zinkadear · 7 months ago
Text
I made a family tree for Midas and Lorenzo's closest relatives. More members may be added at some point, such as kids for Redux and his wife, but I haven't decided on any yet.
Lorenzo's biological mother is at the top, and the two below her are his adoptive parents. He ends up reconnecting with his bio mom, but his bio dad will never be in the picture, so I'm not going to bother adding him. I haven't found a skin for him anyway, and it's not important.
Jules's mother passed away and is obviously no longer with Midas, which is why there's a dotted line between them.
Tumblr media
This was fun to make! I won't be doing this with most pairings, but Midas and Lorenzo are very special to me, and I want to include their family in content.
8 notes · View notes
darokin · 2 years ago
Text
How to dot matrix ascii art.
26 notes · View notes
webhostingsolutions · 5 months ago
Text
How to Check Host Name in Command Prompt?
Tumblr media
Quick tip: Step-by-step guide to checking your hostname in Command Prompt. Simple and clear!
0 notes
linuxtldr · 7 months ago
Text
1 note · View note
unixbhaskar · 9 months ago
Link
0 notes
gurupanguji · 11 months ago
Text
Useful commands for your Mac
A living post about commandline tools for your Mac. Episode 1: Set your hostname on zsh. #apple #terminal #cli #zsh
Terminal is one of my favorite applications in the Mac and I’ve been getting familiar with zsh. This post is a living post where I will keep updating what I learn on the commandline. Update hostname What’s the hostname? The word that shows up right after your username if you open “Terminal.” mac OS used to update the hostname when you update the Computer Name: Settings > General > About Or…
Tumblr media
View On WordPress
0 notes
privategovjobs · 11 months ago
Text
What Kind of Tools Should I Use as a Beginner Software Developer
What Kind of Tools Should I Use as a Beginner Software Developer. Embarking on the journey as a novice in the realm of software development opens up a world filled with both excitement and challenges. The vast array of development tools available can be both thrilling and overwhelming, as each tool serves a unique purpose in the multifaceted process of building software. The significance of selecting the right set of tools cannot be overstated, as it plays a pivotal role in shaping your development experience. These tools are not mere accessories but powerful instruments that directly impact your productivity, facilitate seamless collaboration with others, and contribute to the overall quality of your code.
Read Full Content Here 👇👇
What Kind of Tools Should I Use as a Beginner Software Developer
Tumblr media
0 notes
digitalcreationsllc · 1 year ago
Text
Subdominator: Open-source tool for detecting subdomain takeovers - Help Net Security
Subdominator is a dependable and fast open-source command-line interface tool to identify subdomain takeovers. It boasts superior accuracy and reliability, offering improvements compared to other tools. “Initially, Subdominator was created internally because all the current subdomain takeover tools had gaps in their functionality. No tool had a complete set of accurate service fingerprints or…
Tumblr media
View On WordPress
0 notes
infosectrain03 · 1 year ago
Text
youtube
0 notes
colinkiama · 1 year ago
Text
"git sweep" Alias - Delete All Local Branches Linked To Deleted Remote Branches With Just One Command!
Tumblr media
I used to waste so much time deleting local and remote branches I was done with.
Now I just delete my remote branches (e.g. on GitHub) then run this command:
git sweep
and just like that, my local branches that track remote branches are automatically deleted!
Now let's go over how you can add this command...
What is "git sweep"?
"git sweep" is a git alias I created that is a shortcut that does the following:
Runs the "git fetch --prune" command to delete all references to remote branches.
Find local branches linked to deleted remote branches (these are marked as "gone") then deletes them.
Setting the alias
You can set it using the "git config" command or by editIng the git config file directly.
Here's the command to set the alias with the "git config" command:
git config --global alias.sweep "! git fetch -p && git for-each-ref --format '%(refname:short) %(upstream:track)' | awk '\$2 == \"[gone]\" {print \$1}' | xargs -r git branch -D"
Here's an example of what the config file should look like with the alias added:
[alias] sweep = ! "git fetch -p && git for-each-ref --format '%(refname:short) %(upstream:track)' | awk '$2 == \"[gone]\" {print $1}' | xargs -r git branch -D"
Conclusion
Check out Erik Schierboom's article on this to learn more about how all of this works in detail.
If you found this post useful in anyway, please like, repost and/or share it.
Thanks for reading!
0 notes
techguidenow · 2 years ago
Text
1 note · View note
circumference-pie · 1 year ago
Text
Tumblr media Tumblr media
Nirvana in Fire | Ep 49
A remake of this gifset.
390 notes · View notes
linuxtldr · 8 months ago
Text
0 notes
unixbhaskar · 11 months ago
Link
1 note · View note
autolenaphilia · 1 year ago
Text
Blu-ray DRM is really devilish. I use a program called makemkv to rip them, because there is no other way to play them on my laptop, and there are no legit linux options for blu-ray playback, you have to crack the drm to play them. The easiest solution is makemkv to rip the movies into files, it works out of the box.
But if the level of drm (aacs) on a particular blu-ray is higher than what Makemkv can handle, the disk will update the firmware on your drive to revoke access to makemkv, so it can't access any blu-rays.
"One famous “feature” of AACS is a so-called host revocation. It was designed to ensure that only “approved” software can use your drive. Every Blu-ray disc contains a file that has a list of host keys known to be used by "unauthorized" software. This list has a version number. The moment you insert the disc into your drive, the drive checks if the list is newer than the one it knows about, and if it is, the drive re-flashes itself (updates firmware)."
And that happened to me. It was a blu-ray of the 1972 Hammer horror movie Fear in the Night that did it. The one program that works with my blu-ray player now couldn't access any discs, including ones it had ripped before. And there are absolutely zero linux programs that are authorized to playback blu-ray discs.
I had to flash my drive's firmware to allow something called libredrive, which allows direct access to files and bypasses the aacs drm firmware.
And that was quite the journey. I had makemkv installed as a flatpak via my distro's software manager. and I needed to use the command line. Flatpaks are a great packaging format. but they are primarily for gui apps. So i had to build makemkv from source. And then I had to figure out the commandline for the firmware flashing tool included with makemkv, which was hard because the instructions linked flat out lie. There is no "flash" command for sdftools, there is only "rawflash", you have to read the thread carefully to find that out. This page helped. I had to download new patched libredrive firmware.
And finally i figured out the command I needed ""sdftool -d [drive name] rawflash main,enc -i [new firmware file name].bin. And now I can use my blu-ray drive again. It's now libredrive.
So much work to finally be able to use the drive I paid for, and the blu-ray discs I also paid for. I'm not running some major piracy operation, I just want to be able to watch movies I legally own on my laptop. And drm stopped me, and I had to break it.
This is why DRM is so bad, and anyone who uses it deserves all the piracy they are trying to stop with it. It's scummy to take someone's money and then interfere with their ability to use the copy of the products they own and paid for. It's such atrocious treatment of the customer that anyone who does it deserves to have their stuff pirated.
370 notes · View notes
digitalcreationsllc · 1 year ago
Text
Linux Version of Qilin Ransomware Focuses on VMware ESXi
The Linux encryptor includes extensive command-line options for customization, allowing threat actors to specify exclusion and encryption criteria, as well as configure virtual machines that should not be encrypted.
View On WordPress
0 notes