Search
I'd like to hide/dismiss/remove all the notifications that applications like Signal have created. I know I can create notifications with, for example, notify-send -t 10000 "🤖 Here goes my message"...
If I just used find to generate a list of files, then find's -exec argument is usually the way to run some other program on each file found. If you pipe the command to xargs, note that -P n wi...
When running sed through fish, I often encounter a problem with regexes. Many commonly used regex control characters like []{}().+ need to be escaped, even if I type the regex in a single quoted st...
The usual way is to specify an installation location with ./configure --prefix="$HOME/python" ... and then make install after make. If you don't specify a --prefix argument to configure, it ty...
I use Wine to play Windows games. As is well known: Wine is not a sandbox Windows games are proprietary blobs and can contain malware Windows malware can potentially harm Linux through Wine ...
Suppose I have a list of files on standard input. These may be the output of find, cat filelist.txt or something else. How can I run a command on each file in turn?
I'm not sure which exact fragment, functionality or aspect is problematic to you. Here I will make points (paragraphs) about what I used to struggle to understand, or about what I suspect may be no...
The best method is to navigate to the folder containing your Flac audio files and use the following 'for' loop: for j in *.flac do ffmpeg -i "$j" -c:a libmp3lame -b:a 128k mp3/"${j%.flac}.mp3" ...
SIGUSR1 and SIGUSR2 are user-defined signals. Imagine there is a tool designed to do something useful upon receiving one or the other. The problem is the default action for these signals is Term (...
Don't answer too many questions Avoid major tag gaps Keep the front page lively. My armchair analysis is that the funnel for this site is like this: User gets linked from internet search ...
I'd like to debug NetworkManager by stepping through it using GDB. I assume I'll have to compile NetworkManager from source to get debug symbols since file /usr/bin/NetworkManager indicates that th...
This isn't an answer so much as some information related to your question. We have an open GitHub issue to add searching on reactions. We can already search by post type, category, user, score, a...
How can I convert PDF to docx using the terminal or a Linux app? The output docx must be formatted with editable text. Some alternative solutions I've seen online using soffice and abiword output...
How does the list of packages differ from that in a fresh install? The easiest way, if you have the data for it, would probably be to parse the APT logs (particularly /var/log/apt/history.log*...
You might be enlightened by reading the man page for file(1). A brief quotation: This manual page documents version 5.35 of the file command. file tests each argument in an attempt to classify...
Canina's answer contains a good solution if you only want to reach a small number of hosts. But requiring a port[1] for each host you want to reach doesn't scale to many hosts. It also requires yo...
It is possible - while being unlikely - that /proc/config.gz does not match the actual kernel configuration. Normally, /proc/config.gz should reflect the kernel configuration truthfully. But wheth...
I've got a Raspberry Pi running Raspbian, which I'd like to reinstall from scratch. However over time I've made many changes to the configuration (installed new packages, changed the name of the de...
A shell script! You don't need a shebang line, just invoke it as /bin/sh script.sh, but if you want to add one (e.g. perhaps you anticipate doing this more than once) Then you can copy the command...
You can't expect an attacker to abide by any particular rulebook. In fact, if they did, then the defenders' job would be so much easier. That's why attackers don't do it. Remember the adage: a de...
Categories should be used for broad categories of posts. For example, see how Writing separates the main Q&A from writing challenges, or how Cooking separates its Q&A from recipes, or how M...
On a Debian Buster system I use, the password for connecting to a VPN is stored in the GNOME Keyring. Therefore, whenever I want to connect to the VPN in question, I get prompted to unlock my keyri...
As we start on building a new community here together, we're bound to find some sticking points. Those might be bugs, new features you need, things you need support with... whatever they are, the C...
If these requests are logged into a log file you can install fail2ban and configure it to act on these log entries. You can configure it to block the requests via the local firewall for a duration ...
I have a laptop running Ubuntu 24.04.1 LTS that I would like to access with Remote Desktop (or VNC)[1] from a Mac. I found the Ubuntu system settings to enable Remote Desktop and am able to connec...