I hereby claim:
- I am anthonyvadala on github.
- I am anthonyvadala (https://keybase.io/anthonyvadala) on keybase.
- I have a public key whose fingerprint is F9C2 52F0 84CB 72D2 6AB0 B640 A36F F39A 27F6 F938
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
Copy and paste the filters you want below into an extension such as uBlock Origin's My filter's
page to remove ui elements from Twitter.
# Hide the "What's happening" section from the right sidebar
x.com##*[aria-label="Timeline: Trending now"]
# Hide the "Subscribe to Premium" section from the right sidebar
x.com##.r-3pj75a.r-1mmae3n.r-uaa2di.r-eqz5dr.r-1habvwh.css-175oi2r
# Hide the "Explore" button from the left sidebar
import cv2 | |
import numpy as np | |
from sklearn.cluster import KMeans | |
# function to draw small circles at the bottom right corner of the image | |
def draw_circles(image, colors): | |
height, width, _ = image.shape | |
circle_radius = int(min(height, width) * 0.05) # radius of the circles is 5% of the minimum of height and width | |
for i, color in enumerate(colors): | |
center_x = int(width * 0.9) |
.thumbnails Folder Path
~/Library/Application Support/Dungeondraft/.thumbnails
As of Dungeondraft v1.0.2.4
Computer Information: | |
Manufacturer: NZXT, Inc. | |
Model: System Product Name | |
Form Factor: Desktop | |
No Touch Input Detected | |
Processor Information: | |
CPU Vendor: GenuineIntel | |
CPU Brand: 13th Gen Intel(R) Core(TM) i9-13900K | |
CPU Family: 0x6 |
// ==UserScript== | |
// @name Amazon Smile | |
// @namespace tt | |
// @include https://*.amazon.com* | |
// @version 1.0 | |
// @grant none | |
// ==/UserScript== | |
if (location.hostname !== 'smile.amazon.com') { | |
location.hostname = 'smile.amazon.com'; |
# Ask user for directory input | |
$directorypath = Read-Host 'What is the directory path you want to create links for? (ex. C:\Users\UserName\OneDrive\Foldername)' | |
# Gets relative location for all files in given directory and saves to .txt file | |
Get-ChildItem -Path $directorypath -Recurse | Resolve-Path -Relative | Out-File index.html | |
# Reads index.html file to manipulate data | |
$filename = "index.html" | |
Get-ChildItem -File -Path $directorypath -Filter $filename -Recurse | ForEach { | |
# Removes leading .\ |
Navigate to OVF Export Tool
cd /Applications/VMware\ Fusion.app/Contents/Library/VMware\ OVF\ Tool/
Running to OVF Export Tool
./ovftool ~/Virtual\ Machines.localized/[VMware_Fusion_VM_Name].vmwarevm/[VMware_Fusion_VM_Name].vmx ~/{path_to_export_to}/exported_vm_name.ova
::Hacker Colors | |
color 0a | |
::Checks if script is minimized and relaunches if not | |
if not "%minimized%"=="" goto :minimized | |
set minimized=true | |
start /min cmd /C "%~dpnx0" %* | |
goto :EOF | |
:minimized |
Direct download links are still available on the Docker for Mac Stable Release Notes and Docker Desktop for Windows Stable Release Notes pages.
Consider leaving a comment here suggesting they remove the login requirement from the Docker Hub download pages.