tmux shortcuts & cheatsheet
start new with session name:
tmux new -s myname
|// Comcast Cable Communications, LLC Proprietary. Copyright 2012.|
|// Intended use is to display browser notifications for critical and time sensitive alerts.|
|// var image_url='http://servicealerts.comcast.net:8080/images/mt';|
|var headertext1='<strong>Comcast Courtesy Notice</strong>';|
|var textline1='You have reached 90% of your <b>monthly data usage allowance</b>.';|
|var textline2='Please sign in for more information and to remove this alert.';|
|var acknowledgebutton='<a href=\"#\" onClick="document.location.href=\''+SYS_URL+'?dispatch=redirect&redirectName=login¶mName=bmUid\'" title="Sign in to acknowledge" style="color: #FFFFFF;"><img alt="Sign in to acknowledge" src="'+image_url+'/mt_signin.png"/></a>';|
I missed a payment on my Time Warner Cable bill. Prior to this, the hostname of my laptop was "yupa" (after Master Yupa, from Nausicaa of the Valley of the Wind, because it's a MBA, get it, air? ok, sorry, that's fucking awful I know). Anyway, look at what my hostname is now:
jordanorelli@auto-prov ~: hostname auto-prov.rr.com
umm, excuse me, I never changed my hostname. Anyway, let's back the fuck up and see how I even discovered this.
When I got home today, I opened my MBA and fired up Chrome. On startup, it tried to open up all the tabs that were open when I closed it. Some of these included a google.com page. All of them were, instead, redirected to whatever hostname they were talking to, with
ap_index tacked on the end. E.g., refreshing a Google page bounced me to
google.com/ap_index, which is the automatic provisioning page that a Time Warner Cable tech is supposed to see when they start up the computer. My brother (who is also my roommate) opened the account and has all the i
This describes my basic Arch Linux installation on my Chromebook Pixel.
Note: I'm a coward, so I installed Arch to an SD card instead of wiping out the existing SSD.
Updated: July 2nd (XE7)
Ron Amadeo of Android Police did a review of these experiments: http://www.androidpolice.com/2013/05/24/google-glasss-hidden-labs-features-ok-glass-everywhere-web-browsing-video-stabilization-and-more-video/
Google Glass has a series of Labs experiments that can be enabled on engineering or userdebug builds. Using APKTool, I've removed that restriction and now they can be enabled with root access.
To start, for example, the SOUND_SEARCH lab, type in a root shell
Google Glass XE7 was released this week. This time, Google also released a changelog of all the changes. However, I'm a reader of Ron Amadeo's APK Teardown series, and that column taught me to always hunt for hidden changes in updates.
So without further ado, I present:
#What's Really New: Glass XE7