Executable and Linkable Format (ELF), is the default binary format on Linux-based systems.
Mute these words in your settings here: https://twitter.com/settings/muted_keywords | |
ActivityTweet | |
generic_activity_highlights | |
generic_activity_momentsbreaking | |
RankedOrganicTweet | |
suggest_activity | |
suggest_activity_feed | |
suggest_activity_highlights | |
suggest_activity_tweet |
Due to so many misinformation, false claims and confusion that goes around the web I've decided to make this quick comparison of all most known backup enabling tools, hackable vita firmwares and which one you should be using and why.
Date of last update: 13.01.2020
NoNpDRM Rips | Vitamin / MaiDumpTool Dumps | |
---|---|---|
All original files untouched | ✅ | ❌ |
Support Retail DLCs | ✅ | ❌ |
Support Ripped (NoNpDRM) DLCs | ✅ | ❌ |
Support Dumped (Vitamin/Mai) DLCs | ✅1 | ✅ |
#!/bin/bash | |
set -e | |
CONTENTS=$(tesseract -c language_model_penalty_non_dict_word=0.8 --tessdata-dir /usr/local/share/tessdata/ "$1" stdout -l eng | xml esc) | |
hex=$((cat <<EOF | |
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> |
When developing a program in Ruby, you may sometimes encounter a memory leak. For a while now, Ruby has a facility to gather information about what objects are laying around: ObjectSpace.
There are several approaches one can take to debug a leak. This discusses a time-based approach, where a full memory dump is generated every, say, 5 minutes, during a time that the memory leak is showing up. Afterwards, one can look at all the objects, and find out which ones are staying around, causing the
* { | |
font-size: 12pt; | |
font-family: monospace; | |
font-weight: normal; | |
font-style: normal; | |
text-decoration: none; | |
color: black; | |
cursor: default; | |
} |
<script> | |
var v = "0"; | |
if (v && v == 0) { /* So it's `true` but... also `0` ? */ | |
v = null; | |
if (v == undefined) { /* `null` but equal to `undefined` well... */ | |
v = new Array(10, 11); | |
if (v[0] === 10 && v[1] === 11) { /* Oh! I understood this one! */ |
# vim: ft=sshconfig | |
# Sane security defaults for SSH clients. Disables everything old and nasty. | |
# Unfortunately, SSH appears to provide no way to *exclude* old protocols, | |
# so we have a list of known-secure key exchange algorithms, symmetric ciphers, | |
# and message authentication codes. | |
# Config taken from [https://stribika.github.io/2015/01/04/secure-secure-shell.html] | |
Host * | |
KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256 | |
Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr |
Solarized | |
#FDF6E3,#EEE8D5,#93A1A1,#FDF6E3,#EEE8D5,#657B83,#2AA198,#DC322F | |
Solarized Dark | |
#073642,#002B36,#B58900,#FDF6E3,#CB4B16,#FDF6E3,#2AA198,#DC322F | |
#!/usr/bin/env ruby | |
# | |
# Homebrew fix 1 - osxfuse dylibs | |
# | |
# original solutions: https://gist.github.com/aaronzirbes/3239033 | |
# https://gist.github.com/trinitronx/5437061 | |
# | |
# Fixes the following: | |
# | |
# > Warning: Unbrewed dylibs were found in /usr/local/lib. |