Nope. That's Adobe's ExtendScript for things like After Effects and Photoshop with some shell jibberish added in.
Things to note:
sub(targetBox, boxAnchor)
- Anchors are used on all elements in an AE composition.xDistanceToEdge
- obvious XY two dimensional coordinate in relation to some outer edge (not a bounding box, vector, or an area)MKDIR BKUP
MYCONFIGPROGRAM,SH
CREATE_SAMPLE_FILES,SH
./backup
Make sure to use gold plated monster HDMI cables! The gold makes the bits go faster!
(I think I recently discovered the ultimate form of this. Gold Plated Optical Cable. )
lua is a good language, not for it's feature set, but because it can easily be embedded. https://www.lua.org/ddj.html
this means that you can deploy a statically linked binary, and still have the option for a dynamic runtime. I often wondered why I saw lua everywhere, and this is why.
In this scene, this is supposed to be a wireless ID scanner. Though obviously someone just wanted something that "looked techy" and could display a custom message.
I'm very sorry for the picture of a TV (or can it be considered meta?)
Get your own here: Logitech G13 Programmable Gameboard with LCD Display https://www.amazon.com/dp/B001NEK2GE
From our GNU/Lord and Savior, Linus Torvalds:
Tabs are 8 characters, and thus indentations are also 8 characters. There are heretic movements that try to make indentations 4 (or even 2!) characters deep, and that is akin to trying to define the value of PI to be 3.
Looks like gnome2 with a windows file browser. The mail icon is almost definitely evolution, which would fit gnome 2. And yeah, the file manager looks a lot like IE.
Also, I swear that background came as default on SOME distro. No idea which, though. Google reverse image search and tineye didn't come up with anything.
> Gold plated coax when
Here's a comment I posted earlier, about terminals that support asking before pasting multiple lines:
I don't because RoundCube exists.
I have the same kind of nostalgia for SquirrelMail I have for Windows NT 4.0, basically. It's not exactly praise but it's endearing somehow.
It's Gundam 0083... It's from 91... So yes, that's pretty old. It's the direct sequel to the original Gundam series (though Z, ZZ and Char's Counterattack, all of which take place after 0083 was made before it). But as Star Wars shows us, telling stories in order is obviously not a requirement and Gundam in general takes that to an extreme... Seriously... Just look at this monstrosity https://anidb.net/perl-bin/animedb.pl?show=rel&aid=715
I was able to find this article and this one.
Me, with the latest OS-native, damn-near-worthless, thrash-the-hard-drive, be-all-end-all indexing system that's supposed to solve everything. And then I still end up just installing Everything.
Filesystem, people. It's a system. For your files. Use it.
What, you don't use Cool Retro Term as your daily-driver?
(I actually just switched to this recently with the screen curvature thing turned off and just a bit of glow and static effect applied and it actually does look pretty awesome...)
And yup https://www.adafruit.com/products/1652 (the price is high, but that is a complete kit including case. AbuseMarK + iPad LCD could be as little as ~USD$50 if you play eBay right)
$sh = db()->prepare( " SELECT user_key FROM talkgroup_users WHERE talkgroup_id = :group_id AND user_status = 'ACTIVE'; // you might want to consider an enumeration instead, though text hashing and indices are pretty good... or a filtered index if we're working with a DB engine that supports it. ")
$sh->execute( array( ':group_id' => $group_id ) );
$result_keys = $sh->fetchAll();
Where db() (or global $db, if that's how you roll) returns/is your initialized PDO object.
Oh, apologies. I use tail in a generic sense. Generally I use less
for tailing, but I still call it tailing ;)
I suspect the pic shows a specialised log viewing tool, something similar to http://lnav.org/
You might be lost, but have you tried freeoffice? It's offered by default on some Manjaro distros and it might be more up your alley. I haven't used it personally, but I don't know if it might offer you more of what you're looking for.
Openwrt can be built that way. Doing things like compiling in all packages you need instead of installing them from a package manager helps.
On open wrt complied in packages take up 1/3 the space versus the same package installed with the package manager.
Openwrt has a guide for building a 4mb version, for devices with 32mb.
https://openwrt.org/supported_devices/openwrt_on_432_devices
The website for SGI is oddly up to date looking with its flat design... Weird for a website around 2006/7. This is the page for fsn, the 3D file browser used in the movie, I love that it told you to login anonymously to their ftp server to download it.
https://web.archive.org/web/20070409024417/http://www.sgi.com/fun/freeware/3d_navigator.html
The big difference is Arch vs Debain, so keep that in mind. I tried to use Kali, but I figured it'd be better if I stuck with one OS, so I searched for Arch penetration testing distros and found Black Arch. To my knowledge, it seems to have the most tools out of any around.
I was sure it was an HP DL360 power supply with the connector cut off as well but turns out they never made them with that metal handle so I guess it was plausible that it came from a copier but then I remembered that metal handle from the MSA SANs I used to have, sure enough : https://www.amazon.com/HP-DL100-349800-001-406442-001-Supply/dp/B004570RP2
Photocopier my ass
I own a copy of this book that has a picture of a Listening device that looks very similar to that, the book often has actual gear used in actual known operations but they don't mention if that exact one is real or not (it looks like it's had some use before it was photographed). I'm sure they literally did solder 20 random doodads to a pen for the prop in the show though.
Yeah I make fun of fingerless gloves but they're really sweet, I've had some over the years and have loved them, I have some that I keep in my car because my shifter has a hard plastic knob on it that is either too hot, too cold, or way too slippery, I'm not sure why I haven't just put the factory knob on there (I have it, it's in really nice shape and doesn't look as cool so that's probably why) but it gives me a good excuse to wear gloves while looking like a douchebag but not feeling like one. I would pay $100 for some quality leather ones, the ones I have are probably worth about $20 and have taken a fair amount of breaking in in order to be more usable
I'm amused in those 2 scenes because you can see she uncharacteristically wears a pea coat to sneak in to take the pictures but later on she wears "burglary clothing" to...not be seen? You would think someone with a bag full of equipment wearing a hoodie and fingerless gloves would be clearly someone not supposed to be there vs a woman wearing a blouse and a name badge is from the IT department. Both of the ones they went with are cool looks in their own way but you think she would have worn something more "blend-in-y" or something. She then wears the designer clothing later in the film so she's clearly no stranger to disguises.
Just read a little about the history of Mandrake > Mandriva and now Mageia + other forks seemingly. Sad to see the company behind Mandriva folded a few years ago too. So many good distros have come and gone over the years. There can’t be many other software categories that consistently move forward at the pace Linux has since the 90s. Seems to cause a huge churn of companies, brands and ideas.
Seems that Gaël Duval, the guy that created the original Mandrake distro singlehanded, is now running e.foundation, building a Google-free Android variant with a privacy focus etc. Sounds like a noble endeavour although they’re not alone in that space.
Very interesting that you transitioned from dev to design - may I ask what motivated that decision? It’s a big upheaval for anyone but especially since it sounds like you had a successful career already. Was the journey tough?
Linux for me helped considerably in my own journey to learn elements of development as a young person. The lack of stability in Win 98 at the time drove me try out other things - hence even trying BeOS etc, and opened up a whole new world of experimentation where I could suddenly deploy my own web server, email server and so forth. It was a joy that I never knew existed while in Windows and I was lucky to have access to all of it because in hindsight it was an invaluable learning experience.
I worked in “web design” not long after. “Front end developer” hadn’t yet even become a term, and so I spanned both design and dev including tables based HTML lol, some early JavaScript + php/mysql stuff and also Macromedia ColdFusion as I recall.
In the last 5-6 years I’ve transitioned from design to 3D modelling & development in Unreal Engine. It’s been pretty fun learning a whole new skill set but very intimidating at the start because the learning curve can be steep!
That's valid Golang. GOOS is a constant that's generated at compile time (from the runtime package) that checks to OS. This branch logic is for Linux.
You can read the documentation for the runtime package here: https://golang.org/pkg/runtime
~~Didn't define %s, looking for accounts where the username and password are the same, and~~ the last quad of the unroutable IP is in hex, but missing 0x
Having an impossible address is a nice touch though... keeps the kids from showing up on halloween looking for donuts.
Edit: Just looked up the sprintf function.
What the heckity-heck is `kmalloc`?
Edit: Guess I'm a user-space basic bitch: https://www.kernel.org/doc/htmldocs/kernel-api/API-kmalloc.html
SpaceSniffer is basically the functional equivalent in 2D
http://www.uderzo.it/main_products/space_sniffer/
and here are a bunch of open source alts
so I bet someone could achieve this if they really wanted to (and would have by now).
absolutely, under the domain https://thepiratebay.org/ and others - but many ISPs in many countries block the website - most ISPs block it via a DNS block (this is very easy to implement and very easy on resources for ISPs), for example ISPs in Norway and Sweden and Denmark blocks TPB, all via a DNS block. one really fast DNS that doesn't block them is GoogleDNS, aka 8.8.8.8 / 8.8.4.4 (btw in Norway, GoogleDNS is faster than Telenor DNS, and Telenor is by far the biggest ISP in all of norway, that's quite an achievement for an US company that doesn't really give a shit about norway, i'd say.)
That link shows a cable which is directly connected. Using that mode likely triggered the phone to bypass any GSM voice encoding module (which is the main problem with your argument). If a modem gives you direct access to the data stream, then yes you can get about a 9-14 kbps data stream. HOWEVER, that data would be sent directly to the carrier, not your call recipient (because you're bypassing the voice system).
See also this post on SuperUser which pretty clearly sums up why this technique would not work. The first response says that you might get 2400 baud at best, but he's still being incredibly optimistic, since the error rate would be incredibly high and cause most modems to freak out and drop the connection constantly. Other posts are saying that you would need a highly specialized modem for this, which sounds about right. The modem would need to be engineered to work well with GSM, and have insanely high error correction. EVEN then, you would need the modem on both sides to work that way - not just one side.
The geek in my wants to believe that this was possible, but the nerd in me is saying no... I mean, not that it matters, we have 4g tethering available for mobile data. But; using it as a non-data modem? I'm not so sure...
http://superuser.com/questions/748154/use-a-smartphone-as-a-dial-up-modem
Free to view here. Just have to close ad in the New tab a couple of times then stream starts.
​
Are you aware that it still exists, including a community edition? It's been 15 years since I've used it, but I've been curious about trying it out as a tool for a desktop/mobile cross-platform app.
It's not hard to write code that's XSS resistant if you use modern approaches and avoid treating HTML naively as a string. But it's still really easy to write code with XSS vulnerabilities, especially with templating or vulnerable JS libraries. Here's a quick example: http://jsbin.com/tecoyoxego/1/edit?html,js,output
Even if the browser limits the JS, all you really need is access to window.location. That allows you to do a redirect, which could go to a phishing site or a site that exploits a Flash/Java vulnerability instead.
I guess you’re just not part of the esoteric club, buddy. Sorry.
Here is some Rmd syntax: https://www.rstudio.com/wp-content/uploads/2016/03/rmarkdown-cheatsheet-2.0.pdf Look at “code chunks.”
Here is a cheat sheet for github: https://github.com/adam-p/markdown-here/wiki/Markdown-Cheatsheet Look at “Code and Syntax highlighting.”
Hopefully I’ve pointed you in the right direction so you can google the rest.
Here is a 3.5" WD Blue on Amazon, am I missing something?
Here's what you can actually use if you really want to DoS from Android for whatever reason. Especially from mobile network connections.