(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.
;SMBDIS.ASM - A COMPREHENSIVE SUPER MARIO BROS. DISASSEMBLY | |
;by doppelganger (doppelheathen@gmail.com) | |
;This file is provided for your own use as-is. It will require the character rom data | |
;and an iNES file header to get it to work. | |
;There are so many people I have to thank for this, that taking all the credit for | |
;myself would be an unforgivable act of arrogance. Without their help this would | |
;probably not be possible. So I thank all the peeps in the nesdev scene whose insight into | |
;the 6502 and the NES helped me learn how it works (you guys know who you are, there's no |
# Install ARCH Linux with encrypted file-system and UEFI | |
# The official installation guide (https://wiki.archlinux.org/index.php/Installation_Guide) contains a more verbose description. | |
# Download the archiso image from https://www.archlinux.org/ | |
# Copy to a usb-drive | |
dd if=archlinux.img of=/dev/sdX bs=16M && sync # on linux | |
# Boot from the usb. If the usb fails to boot, make sure that secure boot is disabled in the BIOS configuration. | |
# Set swedish keymap |
(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.
Short version: I strongly do not recommend using any of these providers. You are, of course, free to use whatever you like. My TL;DR advice: Roll your own and use Algo or Streisand. For messaging & voice, use Signal. For increased anonymity, use Tor for desktop (though recognize that doing so may actually put you at greater risk), and Onion Browser for mobile.
This mini-rant came on the heels of an interesting twitter discussion: https://twitter.com/kennwhite/status/591074055018582016
Analytics track you, but they also keep local files really useful for forensics to gather evidence against you.
Because of course, you need to know if people actually use it when it's developed by a PR firm.
Google Analytics tracks a lot of your moves and stored locally in a cache then uploaded to Google servers. Every action is logged.
eval$x=%q(eval(%w(s="]k<<k7@k9 | |
9k@,7&]-7k.@61y?c<c@9k.?isu:,e | |
y<?2k_i]61 o@3i>k@_]9_g36o1@ | |
i4k?w/r?1o ?i=i?yoy65kok95 | |
qw6?ci_:<ye g'=ok?;g'n/g?o | |
i2?.(]{8{)- u8c@4>]u8c-u@ | |
gq7?@4]0;g? ;|g|;]*qkbk0e | |
g,_@eqqeqqg @>'] a<<0e4e5 | |
oi{25>|>?@ c8 &7*3986 | |
@a;;0+>*@2 _i m{@{+_( |
#!/bin/dash | |
# Creates a standalone core image with grub to be started by EFI. | |
# It complements the excellent cryptroot tutorial at | |
# https://community.linuxmint.com/tutorial/view/2061 | |
# for grub on BTRFS inside LVM inside LUKS. | |
# | |
# It initiates decryption of the root device which contains | |
# LVM with BTRFS on the root volume where grub is installed. | |
# Therefore, it allows to load grub from an LUKS encrypted BTRFS | |
# root file system. |
; | |
; the "monitor ROM" of an apple 1 fit in one page (256 bytes). | |
; | |
; this is my attempt to take the disassembled code, give names to the | |
; variables and routines, and try to document how it worked. | |
; | |
; | |
; an apple 1 had 8KB of RAM (more, if you hacked on the motherboard), and a | |
; peripheral chip that drove the keyboard and video. the video was run by a | |
; side processor that could treat the display as an append-only terminal that |