Activity for r~~
Type | On... | Excerpt | Status | Date |
---|---|---|---|---|
Edit | Post #289493 | Initial revision | — | over 1 year ago |
Answer | — |
A: Treat underscores as word boundaries in terminal using vim mode You can't, without patching `readline`. What counts as a word character is hard-coded in the `readline` library, as of this writing. See: https://git.savannah.gnu.org/cgit/readline.git/tree/vimode.c#n620 https://git.savannah.gnu.org/cgit/readline.git/tree/chardefs.h#n115 (more) |
— | over 1 year ago |
Comment | Post #289489 |
What about the experience of searching within less do you find user-unfriendly? Less has a lot of power user features that might be easier to learn than switching to a novel man page consumption model. (more) |
— | over 1 year ago |
Edit | Post #289492 | Initial revision | — | over 1 year ago |
Answer | — |
A: Highlight regions in an image with CLI This is an ideal case for ImageMagick. Given input.png: A random image Running this command: ``` convert input.png -draw 'fill yellow fill-opacity 0.5 polygon 50,50 100,30 150,50 100,150' output.png ``` Produces output.png: The same image with a semitransparent yellow kite drawn o... (more) |
— | over 1 year ago |
Comment | Post #289380 |
As I said, to answer your question as written would require knowledge of your hardware—not because every USB stick is manufactured by a maverick genius, but because there are no standards for secure erase in common use across SSDs and USB sticks. The bargain basement devices are unlikely to let you d... (more) |
— | over 1 year ago |
Comment | Post #289380 |
It's all defense in depth. Do nothing, and the adversary just has to get their hands on your drive. Erase the data, and the adversary has to get their hands on your drive and find the data on a discarded but not erased block. Encrypt and erase the data, and the adversary has to get their hands on you... (more) |
— | over 1 year ago |
Edit | Post #289380 | Initial revision | — | over 1 year ago |
Answer | — |
A: How to securely erase data from a thumb (solid state) drive Answering your question as written, this is a hardware-specific question. Since solid-state storage chips typically keep the details of which cells are being used to write data hidden from the OS, never mind the user, in order to be sure you've erased any unit of data beyond recovery, your hardware v... (more) |
— | over 1 year ago |
Edit | Post #289148 | Initial revision | — | over 1 year ago |
Answer | — |
A: Increase incorrect login attempts before locking account Authentication events such as logging in are ultimately handled by PAM, the Linux Pluggable Authentication Modules project. PAM is very flexible and different Linux distributions will ship with different PAM configurations. The Arch documentation describes how PAM is set up for Arch. In 2020, Arch... (more) |
— | over 1 year ago |
Edit | Post #289070 | Initial revision | — | over 1 year ago |
Answer | — |
A: Why does a reverse hexdump truncate the message? From `man xxd`, the section on the `-r` flag (emphasis added): > -r | -revert > > reverse operation: convert (or patch) hexdump into binary. If not writing to stdout, xxd writes into its output file without truncating it. Use the combination -r -p to read plain hexadecimal dumps without line ... (more) |
— | over 1 year ago |
Edit | Post #289036 | Initial revision | — | over 1 year ago |
Answer | — |
A: What are the correct permissions for `~/.ssh/config`? From `man sshconfig`: > This file is used by the SSH client. Because of the potential for abuse, this file must have strict permissions: read/write for the user, and not writable by others. (more) |
— | over 1 year ago |
Edit | Post #288320 | Initial revision | — | over 1 year ago |
Answer | — |
A: How do I view fonts? In GNOME, `gnome-font-viewer` does this. (more) |
— | over 1 year ago |
Edit | Post #288319 | Initial revision | — | over 1 year ago |
Answer | — |
A: How do you troubleshoot bwrap/wine sandboxes for Windows games? I've done this exact thing with these same tools, as recently as this morning. I use strace to measure file access sometimes; trouble is, a lot of programs/libraries will attempt to look for a lot of files that don't need to exist, so combing through the strace logs can be a long slog too. In theo... (more) |
— | over 1 year ago |
Comment | Post #287570 |
I seem to recall that the default CSS that GNOME Shell uses is compiled into some binary format, not read from disk as CSS. You can extend it with, again, [an extension](https://extensions.gnome.org/extension/19/user-themes/), which at least has enough support from the GNOME team that the GNOME Tweak... (more) |
— | almost 2 years ago |
Edit | Post #287570 | Initial revision | — | almost 2 years ago |
Answer | — |
A: how to manipulate Gnome's "Top Bar"/"Activities Bar"/"Top Panel" using GDK That bar is part of GNOME Shell, and user applications don't get to mess around with the shell. You need to look into writing shell extensions to modify that in a general way. One common thing for an application to want is to show a status icon, in which case you could use an extension like this o... (more) |
— | almost 2 years ago |
Edit | Post #286097 | Initial revision | — | over 2 years ago |
Answer | — |
A: Desktop Multiplexer for Linux? (GNU Screen for GUI apps) Have a look at Xpra. I only use it locally but it's intended to forward from remote hosts as well. (more) |
— | over 2 years ago |
Comment | Post #285187 |
For me, it's not about the difficulty of sorting through the list. It's an emotional thing more than a practical thing. The difference between getting a ping in my RSS reader twice a week and half the time it's an interesting item, and getting a ping in my RSS reader every day and only one in seven i... (more) |
— | almost 3 years ago |
Comment | Post #285187 |
Well, at some level I wonder why tags don't suffice for all of our community separation needs. Why have separate Codidact subdomains, or separate categories within subdomains—just tag some questions with Linux, some questions with Cooking, some questions with Software.Code-Reviews, etc. appropriately... (more) |
— | almost 3 years ago |
Edit | Post #285187 | Initial revision | — | almost 3 years ago |
Answer | — |
A: Should we merge with Power Users? I vote against the merger. It's true that any LS question is likely to be on topic for PU, at least as I understand the scope of the latter, not being a participant in that community. However, I have no interest in any questions about Windows, Microsoft Office, Random Smartphone Model XYZ, or most... (more) |
— | almost 3 years ago |
Edit | Post #284392 |
Post edited: |
— | about 3 years ago |
Edit | Post #284392 | Initial revision | — | about 3 years ago |
Answer | — |
A: In a bash shell script, how to filter the command line argument list to unique entries only, for processing each? Here's an alternative that is a one-liner drop-in for your existing script: ```bash eval set -- $(printf "%q\n" "$@" | sort -u) ``` It works by escaping the initial arguments, piping the escaped arguments through `sort -u` which discards any duplicates, and then unescaping them with `eval` (w... (more) |
— | about 3 years ago |
- ← Previous
- 1
- 2
- Next →