Search
It is incorrect for two reasons. 1. File names containing glob characters This is an edge case scenario. Consider this structure: . ├── abc ├── abc.part ├── cde └── c*e.part The outermos...
Pdf is one of the most unsuitable file formats to use as a starting point for converting it to docx. A pdf by itself is pretty much "dumb", it knows the position of letters etc, but not much more. ...
Port forwarding is something a router does. Port triggering is basically port forwarding that's enabled when a connection attempt is detected and then automatically disabled. That's also handled ...
I have a setup with two Raspberry PIs, a CM3 module with only a USB connection to the outside, and the Pi4 with a lot of connectors. I set up things such that CM3 functions as USB Gadget, and once...
Assuming I have a running Linux system that has the /proc/config.gz file: Does the (unpacked) file always contain all of the options the particular kernel supports, including commented out like: ...
From Wikipedia: Break key: The Pause key is different from all other keys in that it sends no scancodes at all on release in PS/2 modes 1 or 2, so it is impossible to determine whether this key ...
For several days now, I've been getting a notification telling me that there's a pending update to the "snap-store", and to close the app to avoid disruption. I first got this notification while...
I have a shell script with a syntax compatible to both bash and zsh, except for a section that has zsh specific syntax that throws syntax errors if sourced from bash. Is there an easy way to escap...
Since the Pause key is useless, I tried to map it to a modifier key. What is straightforward for other keys turned out not to work fine for Pause. By inspecting the output of xev -event keyboard |...
I got this message: Bad owner or permissions on /Users/rbiaa065/.ssh/config What should the permissions be to make ssh happy?
I switch between three computers and have never been able to keep my dotfiles in sync. I cannot put them into source control because they contain sensitive data. So, my question is: how do I share ...
but it clearly does see that change. Nope. Your environment is being reloaded in the sudo process. sudo echo $PATH gives the same result as echo $PATH because $PATH is expanded by your shell ...
I've been met with the phrase RTFM often. I recognize its value. However, the manual pages are often hard to understand and written by people who know so much about the topic at hand that they don'...
How can I view font files, like .ttf, in Linux? I'd like to see a sample of the font (quick brown fox...) and metadata about it (like exact name).
When we launched this community, we did not yet have the ability to set different reputation grants for different categories. We've had this for a while but we failed to follow up before now, sorr...
Python's interactive interpreter uses GNU Readline, so Bash's line interpreter, not Zle, which is Zsh's. Therefore, when you enter python, the cursor either won't change or will change accordingly...
I use KDE with Slackware -current so: KDE Plasma Version 5.27.3 and this has a quite serviceable Font Manager that can be found from: System Settings --> Appearance --> Font Management Bu...
I think the typical way to do this uses wc ("word count") with the -l ("lines") option. $ wc -l /path/to/file 47 /path/to/file $ wc -l </path/to/file 47 $ cat /path/to/file | wc -l ...
Sometimes I share Unix commands online, and people chastise me for "useless use of cat" (UUOC) or "cat abuse". My cat is quite comfy and doing very well, thank you. What are they talking about?
Overview A "useless use" or "abuse" of cat occurs when a Unix pipeline (sequence of commands that feed into each other, using the shell | or "pipe" operator) includes a call to cat that is unneces...
This is an ideal case for ImageMagick. Given input.png: Running this command: convert input.png -draw 'fill yellow fill-opacity 0.5 polygon 50,50 100,30 150,50 100,150' output.png Produces ...
We are all Linux users and enthusiasts on this site, as well as caring about FOSS. Although technically this is a site for technical Q&A, I think some level of Linux activism is possibly benefi...
While * belongs to the POSIX standard, ** is an extension. You are right it's not in man 7 glob. Tools that treat ** specially (i.e. not as * simply followed by *) tend to agree what it means, but ...
I'm having trouble visualizing exactly what your setup is like, but if I understand correctly, then: You have one client that you are connecting from You have one server that you are able to co...
This blog post describes a privilege escalation, exploiting tar's --checkpoint-action option. The privilege escalation is used to solve a TryHackMe challenge. The root user calls tar via cron whi...