Thread 39298 in /tech/

P39298 install gentoo link reply
56 replies omitted.
P91775 link reply
marital status: cucked
P91776 link reply
P90366
>Why not randomize the machine-id every boot?
There is no difference. Every Whonix user has the same machine-id, making it useless for tracking purposes. Use of Whonix is detectable in numerous other ways, e.g. /usr/share/whonix/marker. You gain nothing by randomizing it.
P91809 link reply
P91776
>You gain nothing by randomizing it.
ok bitchling but what im respectfully asking is why shouldn't you on systemd systems

>Every Whonix user has the same machine-id
Yes i get that every Whonix user has the same anony set just like Tails (in theory like a browser fingerprint)...

But sometimes that can be unique also as it makes it look obvious that your using that OS.
Idk if machine-id is sent over the network but it doesn't make sense why not to randomize every identifier (again tho that might look spammy and fake too).

I also dont get why that anonymity based distros make it known that they are what they are on a network?
>>hostname
>whonix hostname = host
>tails hostname = amnesia


>>mac address
>whonix = no mac adress spoofing by default
>tails = only NIC part and not the full adress which is even an option in Windows now

https://support.microsoft.com/en-us/windows/how-to-use-random-hardware-addresses-in-windows-ac58de34-35fc-31ff-c650-823fc48eb1bc
P91859 link reply
>>P91809
>I also dont get why that anonymity based distros make it known that they are what they are on a network?


cuz they are fake and have been co-opted

Thread 23332 in /tech/

P23332 Uuuhhh I2P bros? What's going on? link reply
> Starting on Dec. 19 the number of tunnels in the network started to increase, and as measured at one router, it peaked at about 3x normal levels on Dec. 26.
> I2P isn't really designed to work that way
> If a popular application uses more network resources than it contributes, it has the potential to take down the entire network.


https://github.com/bitcoin/bitcoin/issues/26754

How are a few bitcoins taking down the entire I2P network???
43 replies omitted.
P91830 link reply
P23334
Where can I find the leaks? I'm craving soup rn
P91834 link reply
P91830
IRC in I2P
P91850 link reply
P91830
There's logs of the dev stuff on http://major.i2p/ . If that site's Acetone's, he's probably using i2pd, which would account for it being hard to reach right n ow. The C++ version seems to be affected more.

http://major.i2p/irc2p/i2p-dev/2024/04/26 (might take awhile to reach)
P91857 link reply
P91850
Loaded fine for me. I do have a really low success rate for tunnels, though.
P91858 link reply
Odd. It loaded in seconds this time but when I first replied it took forever.

Thread 91843 in /tech/

P91843 Amnesiac i2P distro? link reply
Lightweight, no bloat, boots to ram from flash drive, security updates periodically, i2pd preinstalled with dedicated browser configured and clearnet blocked, linux obviously.

>Why don't you just use any amnesiac distro and just install i2pd?

It's too much work to do it each time on a generic amnesiac distro, doxes you when you download i2pd, gotta configure everything after the fact, each time you boot up.

>Why not do it on tails OS?

Tails OS doesn't allow i2pd to connect, only tor traffic is allowed.

It might already exist, in which case please inform me.





P91847 Close as you're getting link reply
Prestium: An Amnesic Operating System for I2P
Prestium is a privacy-focused, secure, lightweight, and easy-to-use live OS for the I2P overlay network.

https://www.reddit.com/r/Prestium/

Never used it myself so
can't rate/10

Thread 72056 in /tech/

P72056 SunOS (AKA Solaris) link reply
sun_ultra_24.jpg
Solaris is a propriety Unix OS from Sun Microsystems, now Oracle. It ran on high-end workstations and servers in the '90s and '00's. It had many cutting edge features for its time. Many of them have made it to other computer systems (rpcbind, NFS, ZFS, Java). [bold: Solaris] is theoretically possible to be the offical OS of Lambdaplusjs chan. Run the SPARC architecture for an extra degree of coolness.

Where can we get it since SPARC hardware is hard to find and usually expensive? Just run it under QEMU (version 8.0.x, 8.1.x SPARC support is broken).

Install DVD:
http://tenox.pdp-11.ru/os/sunos_solaris/sparc/Solaris%209/sol-9-905hw-ga-sparc-dvd.rar

Unrar. Make a disk image for install (hard disk):

qemu-img create -f qcow2 solaris_9.img 36g

Install instructions (mostly the same for Solaris 9):
https://astr0baby.wordpress.com/2018/09/22/running-solaris-2-6-sparc-on-qemu-system-sparc-in-linux-x86_64-mint-19/

Boot with bridged networking (here tap8, adjust for your environment):
qemu-system-sparc -m 256m -M SS-5 -drive file=solaris_9.img,bus=0,unit=0,media=disk -drive file=sol-9-905hw-ga-sparc-dvd.iso,format=raw,if=scsi,bus=0,unit=2,media=cdrom,readonly=on -net nic,macaddr=52:54:00:12:34:58 -net tap,ifname=tap8,id=net0,script=no,downscript=no -audiodev pa,id=snd0 -rtc base=utc -vga cg3 -boot menu=on,order=cd -serial pty -daemonize

Later, we can connect to the serial line printed on startup via Kermit.

Unfortunately I've never gotten the sound to work. Maybe it's not supported in QEMU. Make sure to shutdown the system properly. An improper shutdown makes a real mess. To guard against this, you can use base images (shadow file as they are called in other emulators). Once you get your install to a place you like, "shadow" the disk image after shutdown:
qemu-img create -f qcow2 -b solaris_9.img -F qcow2 solaris_9_sf.img

From this point on, use "solaris_9_sf.img" for your disk image. Once shutdown again, if you are happy with any change, commit the changes:
qemu-img commit solaris_9_sf.img

If you make a mistake, reset back to the last-known-good image with:
qemu-img rebase -f qcow2 -b solaris_9.img -F qcow2 solaris_9_sf.img

and restart with a new solaris_9_sf.img


Watch this thread for more tips & howtos.
27 replies omitted.
P91753 link reply
P89544
Yeah, the project that's on lifeline for the past 5 years. I don't even know if anyone's working on it. I think the last holdouts on it have given up on maintaining the code.
P91794 link reply
Linux has killed pretty much every *nix system, among others. Minix3 is also dead. x86_64 OpenVMS never really took off. Solaris will live on [spoiler:in my heart].
P91803 link reply
P91794
Yes, and it sucks because Linux is a mess internally.
P91812 https://nixos.org/ link reply
>every *nix system
wat bout NixOS?
P91816 link reply
P91812
That's a linux distro you mongrel

Thread 65140 in /tech/

P65140 link reply
tried cinnamon its dogshit
gnome therefore shit
when you try to open a text editor it opens a new tab in the one you already have open in back of 30 other windows and now its in front and on top the stack
has recent files menu. retard idea that was garbage the moment windows introduced it in 1764
adding tor brower to start menu didnt apply until reboot or when cinnamon crashed as it does hourly (forget which)
opening random settings menus makes the desktop settings change because it selects some option by default which isnt the current one and the change is automatically applied instead of you having to press save in this knockoff of ideas that never made any sense like firefox v4 and windows vista
items in tab bar are grouped together by program another idea that never made any sense
hovering over taskbar items and then hovering over the window preview thunmnail peeks at the window contents but thats too confusing because it looks like it just brought the window to front
in settings for panel setting the position to middle or right instead of left doesnt work. it just does nothing. so not even sure if panel is refering to the task bar cus this was how i was gonna confirm that
each settings menu has a "downloads" tab that phones home to display a list of shitty plugins that are even lower quality shit made by randos than cinnamon itself and im scared that the ones that are automatically installed by default are also made by rando yahoo coders / trannies
irrevant stuff like bluetooth manager which if i ever had any use for i would quickly find out that it just lets bluetooth devices run arbitrary bash cmds on my system because its that shit
>parental controls
desklet applet whateverthefucklet really?
privacy settings menu for autistic schizos with no opsec anyway
33 replies omitted.
P68733 link reply
P68730
https://www.kb.cert.org/vuls/id/387387/

It was IPC before dbus. There's alot of them.
P68788 Yuki link reply
P68733
not a vuln
why would you download files you dont trust
>RCE
you dont know what that means
P68789 Yuki link reply
meant to quote P68628
P68797 link reply
P68628
>https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/
>The difficult part of exploiting this vulnerability was finding a way to bypass ASLR. But what I didn’t realize when I started writing the PoC, is that tracker-extract also has a seccomp sandbox which is intended to prevent this kind of exploit from working. It was a nasty surprise when I thought I had all the pieces in place for a working PoC and it failed with the error message: Disallowed syscall "close_range" caught in sandbox. But I still failed to understand that I was attempting a sandbox escape here. I just thought I needed to take a different code path that didn’t use the close_range function. So I tried a different route, it worked, and I didn’t give it any more thought until the GNOME developers asked how I’d managed to escape the sandbox. It turned out that I’d discovered the escape entirely by accident: while I was working on the new route, I unwittingly made a change to the PoC that solved it.

pic and vid related. it's funny how this always happens, on the supposedly uber secure concept that is un*x.

P68733
un*x rule #1: if some program talks to or invokes another, there are code execution vulns. i love how i coined this in 2008 and i have never been wrong once, even right now there are such vulns in every major desktop (and probably more in minor ones made by autistic schizos with zero infosec experience)

P68728
https://www.fvwm.org/
>F? Virtual Window Manager
(insanely autistic deliberations over naming)
didnt read
>https://upload.wikimedia.org/wikipedia/commons/b/ba/Debian_FVWM_Green.png
wiggoid garbage confirmed in 3 nanoseconds
you just listed who is logged into your system and since multiuser systems are obsolete garbage from the 70s you of course only have yourself logged into your system several times by retarded term/shell that log themselves in when you open them. you may as well run everything as root at this point, but a wigger could never overcome the wall of LARPer lore that separates one from logic. you just showed how un*x LARPers dont actually do anything so couldnt actually do anything to demonstrate that they are doing work.
if youre a un*x larper you live in one program all day like vim or gimp, that is your job, you arent allowed to learn about other programs as that would require another 4 year degree.

P91811 link reply
P65140
>gnome therefore shit
bruh i installed gnome on a system for fun cause i thought well tails uses it and it seems ok for the my use case DE

>>gnome
>gnome-online-accounts
> https://gitlab.gnome.org/GNOME/gnome-online-accounts/
>gnome-contacts
> https://gitlab.gnome.org/GNOME/gnome-contacts


> [bold: sudo apt purge gnome-online-accounts gnome-contacts]
>The following packages will be REMOVED:
> gnome-core
>>>>>>>>>> breaks my install <<<<<<<<<<


P65378
>Oh and [bold: purge geoclue*]
yeah thats fine but when I try to remove other geoclue depends that aren't important "supposedly"

>apt list --installed |grep geoclue
>gir1.2-geoclue-2.0
>libgeoclue-2-0
> [bold: sudo apt purge gir1.2-geoclue-2.0 libgeoclue-2-0]
>The following packages will be REMOVED:
> gnome-core


Is there anyway fucking way to have a clean debian GNOME install without the gnome bloat and other soylent shit or what?

Do I have to build from source like tails does and remove it or what i'm lazy and value my time.

Thread 72894 in /tech/

P72894 link reply
10 replies omitted.
P81272 Vaxstation2000 link reply
Check out my virtual X terminal thin client. It has no fixed disk, is network booted off an Infoserver100, and is running X clients from a third node over DECnet.

InfoServer> show sessions

* LASTport Sessions *

Service: VXT_V2_1.FNT (for DK1:VXT_V2_1.FNT, class VXT_SYSTEM)
Session: 00002 Client: VXT_AA0004001004

Service: VXT021.SYS (for DK1:VXT021.SYS, class VXT_SYSTEM)
Session: 00001 Client: VXT_AA0004001004

* LAT Sessions *

Process Connection Connected
Number: State: Node/Port:
------- ---------- ----------
1 Idle
2 Idle
3 Idle
4 Connected LUNAST::UIC_000200000202
InfoServer>
P81289 link reply
P81272
can u telenet into vaxxed inviduals and target them per their social credit score?
P85388 link reply
Someone has mirrored Slackware64. Over gopher.
P88764 vaxstation3100m30 link reply
The vaxstation3100m30 (simh) can be used as a virtual (color, GPX) Xterminal. Only the m30 model seems to work. It's booted with VAXELN EWS off another network node. Note the copyright date - a network-transparent GUI back then. That's before Windows 3.1, which didn't even have such networking.

vaxstation3100m30.ini
>>>>>>>>>>>>>>>>>>>>>>>>>>
set cpu idle
set cpu conhalt
set cpu 16m

att nvr nvr-m30.bin

set rz0 dis
set rz1 dis
set rz2 dis
set rz3 dis
set rz4 dis
set rz5 dis
set rz7 dis

set va capture
set va enable

set nar mac=AA:00:04:00:11:04
att xs tap:tap9

boot cpu
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

On the boot node:
@sys$update:ews$add_node ews 1.17 AA-00-04-00-11-04 qna-0 gab 100

$ncp tell kushal show node 1.17 char
Node Volatile Characteristics as of 05-Apr-2024 17:35:47

Remote node = 1.17 (EWS)

Service circuit = QNA-0
Hardware address = AA-00-04-00-11-04
Load file = EWS$LIBRARY:EWS$GAB_100.SYS

P91631 Robco term link reply
I just realized that the "Robco" terminal in the Fallout games is actually patterned off of OpenVMS.

>set term/inquire ...
This is a valid command, often set in the login.com procedure

>set file/protection ...
Also valid VMS, including the permissions: Read,Write,Exec,Delete (RWED)

>accounts.f ...
FORTRAN programs end in *.f

>run deb ...
"run program" is the command to run a program in VMS. Old VMS systems were commonly green-screen or amber-screen. Both are in all caps by default.

As an Easter egg, I set node Kushala Daora's SYS$ANNOUNCE to "WELCOME TO ROBCO INDUSTRIES (TM) TERMINAL" until next reboot. Use Cool Retro Term for full effect.

Thread 52757 in /tech/

P52757 bet.i2p link reply
Hello! I have created an I2P-only Monero betting website, where you can bet on the hashes of blocks and win Monero. Please try it out! There is also a lottery in which you can buy tickets and the winner is randomly selected every 20000 Monero blocks.

http://z3be23jcvffy3gzucsro3kxayrox6r52imguu3r75l4qnvgunj3q.b32.i2p/
http://bet.i2p/

If you have any questions or suggestions then you can drop them here or contact me with the pbote address at the bottom of the page :)
58 replies omitted.
P83022 link reply
P79938
bank notes also have serious vulns & bugz
mainly due to the serial numbers and hardware identifiers
like how it says in the words FEDERAL RESERVE NOTE and not a united states note
P83053 link reply
Monero currently does not have any (big) known vulnerabilities. But that doesn't mean it never will.
However, anonymizing crypto is literally as shrimple as trading it with some dude you know for cash
P84908 link reply
P83053
>anonymizing crypto is literally as shrimple as trading it with
>some dude you know


Anon I... Please don't commit any crimes, you're too pure for this world and I don't want to see you suffer in prison.

I wonder what happens if you you buy some crypto for cash from your buddy, buy illegal shit with your newly acquired crypto, and a week later glowies come knocking to your friend. I'm sure he keeps his mouth shut and goes rot in prison for you.

>Monero currently does not have any (big) known vulnerabilities. But that doesn't mean it never will.
True. Actually I think as long as you stay in moneroland (i.e. don't go cex -> monero -> cex) you're probably safe for a long time, but obviously nobody knows.
P91513 link reply
You can now bet up to 0.04 XMR
P91586 https://monerosupplies.com/product/fund-a-guerrilla-get-funded/ link reply
P91513
Who cares no one is gunna go threw the hoops to get xmr to then get scammed on some no name betting site

Thread 91397 in /tech/

P91397 link reply
This is a small thing which surprised me today. I'd stopped doing excessive paranoia a while ago so maybe I missed the news.

I used to feel good when uMatrix blocked cookies, but it turns out even without cookies javascript allows local storage which can do the exact same thing, and some websites solely use it instead of cookies. The local storage is specific to domains, so doesn't do cross site tracking.

Tbh I don't even know why I should be afraid of first party cookies even when js is disabled. It's barely worse than tracking my IP address.
P91562 link reply
Dolphin, is that you?

But yeah, you have to kill the Javascript (which breaks 90% of websites) if you want to have any type of privacy. Use Gopher.

Thread 91430 in /tech/

P91430 Imposter game used to train AI lie recognition. link reply
from audio of people lying correlated with when they're the imposter.

Zillenials trained an AI to spot lies using audio recordings.
5 replies omitted.
P91499 link reply
I think the bigger thing is this, how can you poison the Among Us data to hack the algos created from it?

Can you implant a cue that always means you're telling the truth?

Can you implant a cue that someone is lying that isn't to fuzz the algo?
P91503 link reply
Like, if you snap your fingers while always telling the truth in the game, will the algo associate finger snaps with someone telling the truth?

>dafuq da data miner gonna do about it when you take a shit in their data set?

It could be any old uncommon background noise, like someone playing a kazooo faintly.
P91505 cryptotalks.ai link reply
P91503

source of pic please i need to break my nofap streak :)
P91550 link reply
There needs to be a meme for poisoning undisclosed data mining operations with things that deliberately undermine what they intend to use it for without being removable even by human staff looking for it because it's too hard to recognize.

>Clean it up data miner!
P91551 link reply
Probably AI is the best at poisoning data sets.

Thread 82187 in /tech/

P82187 beanpill link reply
is this real
37 replies omitted.
P86252 https://yt.drgnz.club/watch?v=Vv-GbmlvPn4 link reply
P86204
>It can only detect malware it has already seen and modern malware changes itself to avoid detection anyway.
Its called hashes thats what it checks
It gets to me that windows users just blindly download things and dont check checksums of the things [they] download.
Thats why I use a linux VM or save .exes for software for windows that were downloaded with linux since it includes gnupg (PGP).
P91342 link reply
P85275

P91375 link reply
> It can only detect malware it has already seen
B-but they told me in uni that they monitor the programs' activity and detect even unknown threats!
P91377 sage and university pilt link reply
P91375
>uni
P91428 12of7 reply link reply
P85337

Thread 66887 in /tech/

P66887 gpg --store -a link reply

23 replies omitted.
P91367 link reply
P91368 link reply
P91367
+10 with this faction

gpg: key 4AA8DA5D164F9E18: public key "jpmch2hrsa4cat07172025 <pgpadmin@ecqa.jpmorganchase.com>" imported
gpg: Total number processed: 1
gpg: imported: 1
P91371 link reply
P91355
P91368
gpg --homedir=/tmp/.gnupg -a --comment nigger --comment "base64: invalid input" --export nigger

for niggers the correct anwser is u [bold: put --comment after -a, --armor]

P91368
how did they imbed ther gpg version tho without --comment?
P91380 link reply
P91371
It's probably an option in the config, but I don't care to read thru the manpage for it right now. If not that, then maybe a build flag in the source code.
P91381 base64: invalid input link reply
maybe gnupg2 or older versions or what have you...

>then maybe a build flag in the source code.
yeah aint nobuddy got time 4 dat niggah

Thread 86747 in /tech/

P86747 xz backdoored, ssh compromised link reply
https://www.openwall.com/lists/oss-security/2024/03/29/4

xz upstream maintainer knowingly introduced a pretty sophiasticated backdoor (with preparation steps that took almost a year to hide as long as possiblre)

Xz versions v5.6.0 and v5.6.1 are vulnerable. The backdoor is programmed in such a way that it only changes the ssh behaviour (assuming some prerequisities are met, for example not run from a terminal)

proceed appropriately
48 replies omitted.
P90926 link reply
P90878
just write your own software smh
P91140 link reply
P90878
I know...having the source not matching was how this one hid itself, though.
The point of using the git code that matches the tag is that the git code is (hopefully) more thoroughly examined by others. Various distributions were just assuming the two matched when they did not.
P91251 link reply
P91140
Source of pic please?
P91278 link reply
P91251
I don't remember.
P91370 link reply
Yeah right faggot send me the deets I imported your key love...


Thread 64768 in /tech/

P64768 link reply
tried clementine its dogshit breaks after you seek twice. until you switch song and switch back
back to foobar2000 in wine
22 replies omitted.
P68241 Sage link reply
P68233
yeah sure, and i use wsl to ssh into my mothers fartbox
P68252 link reply
Just use AIMP everywhere nigger.
P68327 link reply
P68233
P68241
look at the wiggers arguing over who really uses a garbage wigger LARPer os
debian predictable random number generator nevar forget
P91280 link reply
>select files
>right click
>open with other application
>vlc

it just works so well i forget im even using vlc
P91366 link reply
>DeaDBeeF is a modular audio player similar to foobar2000
https://packages.gentoo.org/packages/media-sound/deadbeef

Thread 64025 in /tech/

P64025 sudon't link reply
sudont.jpg
Please stop abusing sudo. Ubuntu and others are big on this. It's not training wheels for root. Login as a normal user. If you need to do admin stuff, login in as root proper like a big boy. sudo is for, say, a student aid in a CS lab that is allowed to mount/unmount disks as the class needs them.

If your distro does this, dump it for a *nix that doesn't.
128 replies omitted.
P66680 link reply
>>P66636
>Sorry to disappoint with the boring but correct answer.

He says, while I sit on N days for Ubuntu (can't post for OPSEC reasons), and Gentoo has a policy of applying security patches as they are published. Using something other than Gentoo for server hosting is retarded precisely because you have no control over what your OS does. One day Ubuntu will update randomly to add cat pictures to your shell and fail to reboot. Another day it will add some shit to backup all your data to the cloud and not tell you. Etc.
P66682 link reply
P66651
no its (((tagged hardware)))
P66686 link reply
XD that is 1st use of (((brackets))) that makes any sense
P66690 link reply
https://users.cs.utah.edu/~mflatt/past-courses/cs6510/public_html/lispm.pdf
>oh no the goyim know were going use this for tracking them at the hardware level oy vey shut it down and lock it up into (((ivory tower)))
P91357 ITMOTB link reply

Thread 7244 in /tech/

P7244 QTDDTOT link reply
Thread dedicated to Questions That Don't Deserve Their Own Thread
[spoiler: (but are worth asking)]
Lambda edition
449 replies omitted.
P91339 link reply
is qubes really all that secure, or is it just a meme? why or why not?
P91344 link reply
P91320
>pic
this is going to be me autistically blogging my sorrow after my next threech iteration dies unceremoniously
P91348 link reply
P91339
[bold: yes and no]
just generate your pgp in ram
gpg --homedir /tmp/.gnupg --full-generate-key

Then export your secret key to your sdcard or usb device
gpg --homedir /tmp/.gnupg --armor --export-secret-key faggot@faggot > /dev/sdb/faggot-private.asc
P91349 link reply
P91344
just launch threechplusonion. that way it doesnt go down.
P91354 link reply
P91349
too ez

Thread 80217 in /tech/

P80217 how long til wiggers r saying this link reply
>stuff dumping tmp files everywhere
>phishing
>confused deputies
>hardcoded stuff that should easily have been configurable
>overly rigid permissions that are either too lax or break everything

the capability model just solves everything!
P80218 link reply
P80219 link reply
imagine some javaee boomer fuck who spent thousands of hours configuring logging and CI while telling himself all this overly verbose inefficient bug prone java way of doing configuration is right. he discovers the capability model. and like everything in java implements it in some fucktarded way that barely works. then they all make blog posts about how excited they are for capability based programming, with maven + OSGI + SecurityManager 2.0 + Classpath Bootstrap NoGlobals Classloader 3.0
P91277 link reply
>stuff dumping tmp files everywhere
Just use mkstemp
>the capability model just solves everything!
Everybody just will assign the root capability just like how everybody disabled SELinux.
P91321 link reply
[bold: FULL NETWORK ACCESS]

Thread 34837 in /tech/

P34837 Juniority link reply
Original conversation in P34698

This project has grown to the point of deserving its own thread.

Juniority is a (junior) gravure organizer. It's an ncurses application because git gud.
It uses sqlite for data storage, put it in your ecryptfs directory so the glowies don't find it.
Written in GNU Guile.

Currently what we've got is a stdio import mode and a splash screen. Updates will be posted in this thread. Be here or be queer.
114 replies omitted.
P89896 link reply
>1 year already
owari da
P89899 link reply
pedo software should be written in c for cunny
P90143 clearnet + sage link reply
P89886
>Do you have a Juniority success story?
P91246 User Referendum link reply
Q: Would you like a coom tracking feature that associates your cooms with a particular volume?
You can then look at your coom log, where each coom can be inspected for the associated volume and idol(s).
P91299 sage link reply
>clearnet repository

Thread 77920 in /tech/

P77920 Bashisms link reply
bash.jpg
After much consideration, I've concluded that I am going to embrace every possible bashism, and spend no time considering portability. This may come as a shock to some. Here are my reasons:

1) Writing good (readable, appropriate tools) code is more important than portability
2) Bash is available on (probably) all platforms
3) Using GNU tools likely breaks portability anyway

I am now working on rewriting all my scripts without portability in mind, and embracing non-POSIX shell features. Thank you for reading my blog.

#!/bin/bash

check_dependencies() {
deps=()

for dep in "$@"; do
if ! command -v "${dep}" &>/dev/null; then
deps+=("${dep}")
fi
done

if (( "${#deps[@]}" > 0 )); then
echo "Missing dependencies" "${deps[@]}"
fi

}

check_dependencies "$@"
10 replies omitted.
P78201 link reply
>bash thread
<no junior idol pics
this place isn't what it used to be
P78224 P-Please l-look a-at m-my s-s-s-stutter link reply
P78201
It might be b8 thread (or pic related), some of the premises don't make sense, having this function as POSIX would barely be any less readable and he can't even write a proper script.
At least he didn't use the bash-exclusive function keyword and quoted all variables.
P78235 link reply
P78224
>can't even write a proper script.
what's the actual problem besides not making the array local?
P78238 link reply
P78235
It's not as bad as others from the past:
* no set -u
* no set -e (at least for this particular script)
* braindamage echo instead of printf
* can shorten ifs from:
if command; then
nigger
fi
to:
command && nigger
* adopting if (( "${#deps[@]}" > 0 )) bashism that has if [ "${#deps[@]}" -gt 0 ] as a clear portable equivalent for no reason
* not sure what "&> /dev/null" is doing there instead of just "> /dev/null"
P91279 link reply
P77920
>not using autoconf to find dependencies
Don't reinvent the wheel!

Thread 34698 in /tech/

P34698 GNU Guile link reply
Here we discuss the greatest scripting language of all time, GNU Guile.

GNU Guile is a Scheme dialect that is:
- easy to embed as a scripting language
- extremely feature-rich
- unparalleled as a scripting language
- more suitable as an application language than python
- the official scripting language of GNU: embedded in GNU applications and used to implement Guix
54 replies omitted.
P63940 link reply
P63939
And....that's why you need code tags, so that the board software doesn't parse literal text.

http://digitalsr.i2p/computing/rater.py
P80952 link reply
If you're using the Guile REPL make sure to add this to your ~/.guile file so you can edit what you're typing in.

> (use-modules (ice-9 readline))
> (activate-readline)
P80953 sage link reply
copy and pasted from the mit bbs P80952
P89731 Based Guile link reply
(define (jewish-name) jewish-name)

(((((((((((((((((((((((((((jewish-name)))))))))))))))))))))))))))
P91274 link reply
>GNU Guile - the GNU Ubiquitous Intelligent Language for Extensions
>GNU Kawa - an implementation of the Scheme programming language that is built on top of the Java platform
>GNU Mes - features a mutual self-hosting Scheme interpreter written in a simple C
>GNU/MIT Scheme - an implementation of the Scheme programming language
>GNU SCM - an implementation of Scheme
>GNU CLISP - an implementation of ANSI Common Lisp
>GNU Common Lisp - an implementation of the Common Lisp language

Why are there so many GNU implementations of Scheme and Lisp?

Thread 83325 in /tech/

P83325 SIXEL link reply
ScreenShot.png
>Give me six pix
>Give me SIXEL pix, mister
>Give me six towards the door..
>Give me six pix
>Give me SIXEL pix, mister
>And you'll never hear of me no more

For sure!

>Sixel was first introduced as a way of sending bitmap graphics to DEC dot matrix printers like the LA50. After being put into "sixel mode" the following data was interpreted to directly control six of the pins in the nine-pin print head. A string of sixel characters encodes a single 6-pixel high row of the image.

>The system was later re-used as a way to send bitmap data to the VT200 series and VT320 terminals when defining custom character sets. A series of sixels are used to transfer the bitmap for each character. This feature is known as soft character sets or dynamically redefinable character sets (DRCS). With the VT240, VT241, VT330, and VT340, the terminals could decode a complete sixel image to the screen, like those previously sent to printers.

https://saitoha.github.io/libsixel/

Unfortuntely, almost nothing supports it. To check on VMS, use "show term" and look for SIXEL. Linux Konsole does out of the box, and Xterm can be coaxed into it.

~/.Xresources
>>>>>>>>>>>>>>>>>admin add code tags>>>>>>>>>>>>>>>>>>>>
!! Xterm SIXEL support
xterm*decTerminalID: vt340
xterm*numColorRegisters: 256
xterm*sixelScrolling: 1
xterm*sixelScrollsRight: 1
>>>>>>>>>>>>>>>>>admin add code tags>>>>>>>>>>>>>>>>>>>>>

xrdb -merge ~/.Xresources && uxterm

ImageMagick can be used to convert images, as well as the tools in libsixel. Feel free to affix your favourite picks of SIXEL pix to this here fixed SIXEL pix pic thread.

5 replies omitted.
P84972 Gnuplot link reply
gnuplot can use SIXEL. "set terminal sixelgd".
P84993 link reply
So all it is so u can inbed pictures into your shell lol doesn't this already exist?

>>>>>>>>>>>>>>>>>admin add code tags>>>>>>>>>>>>>>>>>>>>
Yes agreed on that one m8
P85164 I2SIXEL! link reply
See what I did there?
P91148 "Foot" terminal link reply
Despite the fact that I hate the name (it sounds dirty & nasty), it's a good terminal that supports SIXEL for the Waylads and Waylasses out there.

https://codeberg.org/dnkl/foot

P91150 link reply
Are there decent terminal emulators for Android which support SIXEL?
x