- Go to official site and download, download and install
- Add config file to your
~/.keynavrc
:
ctrl+semicolon start, cursorzoom 20 20
shift+h cut-left
shift+j cut-down
shift+k cut-up
[Title image is fetched successfully] | |
Bad news about Word docs, PDFs, etc. | |
The aforementioned tools work really well with visual and audio media, but text documents are unfortunately much more complex. Documents like .docx, .xlsx, .pdf, .ppt, and others usually contain multiple embedded images, videos, and other media files. They’re kind of like nesting dolls. So, while it’s possible to scrub basic metadata tags from any of these documents, the objects embedded within them have a so much metadata of their own that can be individually scrutinized. This makes the idea of software-based retraction somewhat foolish. | |
Here’s an example: Using another open source tool called Peepdf, we’re able to see all the different objects (like images) embedded into any.pdf file. So, even if we were to strip the metadata from the document itself, anyone can extract any of its individual embedded images, and parse their metadata for more identifying context using any of the aforementioned methods. (Also, did I forget to mention |
let langmap = "ёйцукенгшщзхъфывапролджэячсмитьбюЁЙЦУКЕHГШЩЗХЪФЫВАПРОЛДЖЭЯЧСМИТЬБЮ;`qwertyuiop[]asdfghjkl\\;'zxcvbnm\\,.~QWERTYUIOP{}ASDFGHJKL:\"ZXCVBNM<>" | |
let blacklists = ["https://vim-adventures.com/*"] | |
set noautomakelinks | |
set noautofocus | |
let hintcharacters = "asdfgwertzxcvbkjpoiunml" | |
let mouselesshintcharacters = "asdfgwertzxcvb,kjpoiunml" | |
let newtaburl = "chrome://new-tab" | |
imap <C-o> editWithVim | |
let searchengine forvo = ["https://forvo.com", "https://forvo.com/word/%s#en"] | |
command f open forvo |
~/.keynavrc
:ctrl+semicolon start, cursorzoom 20 20
shift+h cut-left
shift+j cut-down
shift+k cut-up
#!/usr/bin/env python2 | |
import os | |
if not('TERM' in os.environ): | |
os.exit() | |
#----------------------------------------------------------------------------+ | |
# Color picker, usage: | | |
# import pycolor as pc | | |
# print pc.BLD + pc.CUR + pc.RED + "Hello there!" + pc.DEF | |
set -g default-terminal "screen-256color" | |
bind-key -r C-h resize-pane -L 5 | |
bind-key -r C-j resize-pane -D 5 | |
bind-key -r C-k resize-pane -U 5 | |
bind-key -r C-l resize-pane -R 5 | |
bind-key -r M-h resize-pane -L | |
bind-key -r M-j resize-pane -D | |
bind-key -r M-k resize-pane -U |
#!/bin/sh | |
#================== Load certificate from server =============================== | |
HOST_NAME="${HOST_NAME:-google.com}" | |
SERVER_NAME="${SERVER_NAME:-${HOST_NAME}}" | |
PORT="${PORT:-443}" | |
FORMAT="${FORMAT:-PEM}" # DER|PEM|NET see `man x509` | |
FILE_NAME="${FILE_NAME}" # Filename into /usr/local/share/ca-certificates |
#!/bin/sh | |
#================== Check dependencies ========================================= | |
if ! which openssl; then | |
echo "Reqiure openssl installed" | |
exit 1 | |
fi | |
#================== Generate CA if need ======================================== |