Communities

Writing
Writing
Codidact Meta
Codidact Meta
The Great Outdoors
The Great Outdoors
Photography & Video
Photography & Video
Scientific Speculation
Scientific Speculation
Cooking
Cooking
Electrical Engineering
Electrical Engineering
Judaism
Judaism
Languages & Linguistics
Languages & Linguistics
Software Development
Software Development
Mathematics
Mathematics
Christianity
Christianity
Code Golf
Code Golf
Music
Music
Physics
Physics
Linux Systems
Linux Systems
Power Users
Power Users
Tabletop RPGs
Tabletop RPGs
Community Proposals
Community Proposals
tag:snake search within a tag
answers:0 unanswered questions
user:xxxx search by author id
score:0.5 posts with 0.5+ score
"snake oil" exact phrase
votes:4 posts with 4+ votes
created:<1w created < 1 week ago
post_type:xxxx type of post
Search help
Notifications
Mark all as read See all your notifications »

Activity for r~~‭

Type On... Excerpt Status Date
Edit Post #289493 Initial revision over 1 year ago
Answer A: Treat underscores as word boundaries in terminal using vim mode
You can't, without patching `readline`. What counts as a word character is hard-coded in the `readline` library, as of this writing. See: https://git.savannah.gnu.org/cgit/readline.git/tree/vimode.c#n620 https://git.savannah.gnu.org/cgit/readline.git/tree/chardefs.h#n115
(more)
over 1 year ago
Comment Post #289489 What about the experience of searching within less do you find user-unfriendly? Less has a lot of power user features that might be easier to learn than switching to a novel man page consumption model.
(more)
over 1 year ago
Edit Post #289492 Initial revision over 1 year ago
Answer A: Highlight regions in an image with CLI
This is an ideal case for ImageMagick. Given input.png: A random image Running this command: ``` convert input.png -draw 'fill yellow fill-opacity 0.5 polygon 50,50 100,30 150,50 100,150' output.png ``` Produces output.png: The same image with a semitransparent yellow kite drawn o...
(more)
over 1 year ago
Comment Post #289380 As I said, to answer your question as written would require knowledge of your hardware—not because every USB stick is manufactured by a maverick genius, but because there are no standards for secure erase in common use across SSDs and USB sticks. The bargain basement devices are unlikely to let you d...
(more)
over 1 year ago
Comment Post #289380 It's all defense in depth. Do nothing, and the adversary just has to get their hands on your drive. Erase the data, and the adversary has to get their hands on your drive and find the data on a discarded but not erased block. Encrypt and erase the data, and the adversary has to get their hands on you...
(more)
over 1 year ago
Edit Post #289380 Initial revision over 1 year ago
Answer A: How to securely erase data from a thumb (solid state) drive
Answering your question as written, this is a hardware-specific question. Since solid-state storage chips typically keep the details of which cells are being used to write data hidden from the OS, never mind the user, in order to be sure you've erased any unit of data beyond recovery, your hardware v...
(more)
over 1 year ago
Edit Post #289148 Initial revision over 1 year ago
Answer A: Increase incorrect login attempts before locking account
Authentication events such as logging in are ultimately handled by PAM, the Linux Pluggable Authentication Modules project. PAM is very flexible and different Linux distributions will ship with different PAM configurations. The Arch documentation describes how PAM is set up for Arch. In 2020, Arch...
(more)
over 1 year ago
Edit Post #289070 Initial revision over 1 year ago
Answer A: Why does a reverse hexdump truncate the message?
From `man xxd`, the section on the `-r` flag (emphasis added): > -r | -revert > > reverse operation: convert (or patch) hexdump into binary. If not writing to stdout, xxd writes into its output file without truncating it. Use the combination -r -p to read plain hexadecimal dumps without line ...
(more)
over 1 year ago
Edit Post #289036 Initial revision over 1 year ago
Answer A: What are the correct permissions for `~/.ssh/config`?
From `man sshconfig`: > This file is used by the SSH client. Because of the potential for abuse, this file must have strict permissions: read/write for the user, and not writable by others.
(more)
over 1 year ago
Edit Post #288320 Initial revision over 1 year ago
Answer A: How do I view fonts?
In GNOME, `gnome-font-viewer` does this.
(more)
over 1 year ago
Edit Post #288319 Initial revision over 1 year ago
Answer A: How do you troubleshoot bwrap/wine sandboxes for Windows games?
I've done this exact thing with these same tools, as recently as this morning. I use strace to measure file access sometimes; trouble is, a lot of programs/libraries will attempt to look for a lot of files that don't need to exist, so combing through the strace logs can be a long slog too. In theo...
(more)
over 1 year ago
Comment Post #287570 I seem to recall that the default CSS that GNOME Shell uses is compiled into some binary format, not read from disk as CSS. You can extend it with, again, [an extension](https://extensions.gnome.org/extension/19/user-themes/), which at least has enough support from the GNOME team that the GNOME Tweak...
(more)
almost 2 years ago
Edit Post #287570 Initial revision almost 2 years ago
Answer A: how to manipulate Gnome's "Top Bar"/"Activities Bar"/"Top Panel" using GDK
That bar is part of GNOME Shell, and user applications don't get to mess around with the shell. You need to look into writing shell extensions to modify that in a general way. One common thing for an application to want is to show a status icon, in which case you could use an extension like this o...
(more)
almost 2 years ago
Edit Post #286097 Initial revision over 2 years ago
Answer A: Desktop Multiplexer for Linux? (GNU Screen for GUI apps)
Have a look at Xpra. I only use it locally but it's intended to forward from remote hosts as well.
(more)
over 2 years ago
Comment Post #285187 For me, it's not about the difficulty of sorting through the list. It's an emotional thing more than a practical thing. The difference between getting a ping in my RSS reader twice a week and half the time it's an interesting item, and getting a ping in my RSS reader every day and only one in seven i...
(more)
almost 3 years ago
Comment Post #285187 Well, at some level I wonder why tags don't suffice for all of our community separation needs. Why have separate Codidact subdomains, or separate categories within subdomains—just tag some questions with Linux, some questions with Cooking, some questions with Software.Code-Reviews, etc. appropriately...
(more)
almost 3 years ago
Edit Post #285187 Initial revision almost 3 years ago
Answer A: Should we merge with Power Users?
I vote against the merger. It's true that any LS question is likely to be on topic for PU, at least as I understand the scope of the latter, not being a participant in that community. However, I have no interest in any questions about Windows, Microsoft Office, Random Smartphone Model XYZ, or most...
(more)
almost 3 years ago
Edit Post #284392 Post edited:
about 3 years ago
Edit Post #284392 Initial revision about 3 years ago
Answer A: In a bash shell script, how to filter the command line argument list to unique entries only, for processing each?
Here's an alternative that is a one-liner drop-in for your existing script: ```bash eval set -- $(printf "%q\n" "$@" | sort -u) ``` It works by escaping the initial arguments, piping the escaped arguments through `sort -u` which discards any duplicates, and then unescaping them with `eval` (w...
(more)
about 3 years ago