VMWare Fusion 13 is now released. Read Vagrant and VMWare Fusion 13 Player on Apple M1 Pro for the latest.
This document summarizes notes taken while to make the VMWare Tech preview work on Apple M1 Pro, it originated
VMWare Fusion 13 is now released. Read Vagrant and VMWare Fusion 13 Player on Apple M1 Pro for the latest.
This document summarizes notes taken while to make the VMWare Tech preview work on Apple M1 Pro, it originated
This walks you through installing JACK, connecting a USB sound card, and copying the audio on the input port onto the output port. The result: you will hear what you say played back immediately from the headphones.
sudo pip install setuptools
sudo apt-get install python-dev
sudo apt-get install libffi-dev
sudo killall fbi >/dev/null 2>&1 | |
dialog --infobox "\nWelcome to retro gaming console - First time boot ! hang tight - Resizing the filesystem ..." 5 60 | |
sudo raspi-config nonint do_expand_rootfs >/dev/null 2>&1 | |
sleep 2 | |
dialog --infobox "\nDone. Rebooting now- ready to play in few moments..." 5 60 | |
sudo rm -f /etc/profile.d/01-expand.sh | |
sleep 2 | |
sudo reboot |
It has been a long time since I finish(nearly) these problems...
In linux, 0
is std_input, 1
is std_output, 2
is std_error_output.
We just need to send LETMEWIN
to std_input and set fd to 0
which means (our input - 0x1234) == 0.
#!/bin/bash -e | |
PLAYER="mpv -vo null" | |
#PLAYER="mpg321" | |
MUSIC=$(find . -regextype posix-extended -iregex '.*(m4a|mp3|mp4|aac)$' | sort -R) | |
IFS=$'\n' | |
for file in $MUSIC |
public abstract class BaseStatelessBlackBoxEspressoTest<T extends Activity> extends ActivityInstrumentationTestCase2<T> { | |
private SystemAnimations mSystemAnimations; | |
public BaseStatelessBlackBoxEspressoTest(Class clazz) { | |
super(clazz); | |
} | |
@Override | |
protected void setUp() throws Exception { |
#!/bin/bash | |
# Kill transmission-daemon if it is running | |
transmission_da_pid=$(pgrep transmission-da) | |
if [ $transmission_da_pid ]; then | |
killall transmission-daemon && echo "Closing existing tranmission-daemon processes ..." && sleep 8 | |
fi | |
# Get VPN IP to bind to | |
bind_address=$(ip addr show tun0 | grep inet | awk '{print $2}') |
import android.app.Activity; | |
import android.content.Context; | |
import android.content.ContextWrapper; | |
import android.support.test.espresso.UiController; | |
import android.support.test.espresso.ViewAction; | |
import android.view.View; | |
import com.squareup.spoon.Spoon; | |
import org.hamcrest.Matcher; | |
import org.hamcrest.Matchers; |
import android.content.Context; | |
import android.content.res.TypedArray; | |
import android.graphics.Canvas; | |
import android.graphics.Rect; | |
import android.graphics.drawable.Drawable; | |
import android.support.v7.widget.LinearLayoutManager; | |
import android.support.v7.widget.RecyclerView; | |
import android.util.AttributeSet; | |
import android.view.View; |
#!/bin/bash | |
#analysis script | |
#goal: for each file that isn't a rar, tar, gz, txt, reg, bat or sh: | |
#make a directory, copy the malware into the directory, cd into the directory, run hashing tools, file, strings dump into file (separate file for strings output, because its obnoxiously long in most cases) go back to parent directory, rinse, repeat until done. | |
#also stores a hash file for each hash type done in one single master file in the parent directory (e.g. all_md5.txt, all_ssdeep.txt, etc.) | |
for i in `ls -1 | egrep -v "sh|bat|rar|tar|gz|txt|reg"`; do | |
filedir=`echo $i`_analysis | |
filetxt=`echo $i`_analysis.txt | |
filestr=`echo $i`_strings.txt | |
mkdir -p $filedir |