This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# NVIDIA Jetson TK1 | |
# Get rtsp stream from network, decode and display | |
SOURCE=<IP ADDRESS OF MACHINE, e.g. 10.10.10.10> | |
#VIDEO Capabilities of the receiver | |
VIDEO_CAPS="application/x-rtp,media=(string)video,clock-rate=(int)90000,encoding-name=(string)H264" | |
TCP_VIDEO_CAPS="application/x-rtp" | |
VIDEO_SINK="videoconvert ! xvimagesink sync=false" | |
TCPSRC="tcpclientsrc host=$SOURCE port=5000" | |
VIDEO_DEC="h264parse ! omxh264dec" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Useful ADB commands | |
We have made a list of the most common adb commands that will help with your FAMOCO project. | |
FAMOCO ID | |
adb shell getprop ro.serialno | |
DEVICE MODEL | |
adb shell getprop ro.product.model |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Following parameter has to be added to kernel if you need to enable Android KLOG. | |
printk.devkmsg=on | |
Enable OMX full logs: | |
stop media | |
setprop debug.omxr.mc 0x33333300 | |
setprop debug.omxr.adapter 0xffffffff | |
start media | |
or | |
adb root && adb shell stop media && adb shell setprop debug.omxr.mc 0x33333300 && adb shell setprop debug.omxr.adapter 0xffffffff && adb shell start media |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
./cts-tradefed run cts --skip-preconditions --skip-device-info --primary-abi-only -m CtsSecurityTestCases -t android.security.cts.StagefrightTest#testStagefright_bug_32322258 | |
https://android.googlesource.com/platform/frameworks/av/+/36b04932bb93cc3269279282686b439a17a89920 | |
CVE-2017-0603 | |
Denial of service vulnerability in Mediaserver | |
A denial of service vulnerability in Mediaserver could enable an attacker to use a specially crafted file | |
to cause a device hang or reboot. | |
This issue is rated as Moderate because it requires an uncommon device configuration. | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# https://push2mebot.herokuapp.com/197882762 | |
curl -X GET "https://push2mebot.herokuapp.com/197882762/test_message" | |
curl -X POST -F "image=@/Users/user1/Downloads/cats.jpeg" "https://push2mebot.herokuapp.com/197882762/image" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
rm -rf /tmp/timelapse | |
mkdir -p /tmp/timelapse | |
adb pull /sdcard/timelapse/ /tmp/timelapse | |
export IMAGEPATH=/tmp/timelapse | |
export VIDEOFILE=~/timelapse/video.avi | |
mencoder -nosound -ovc lavc -lavcopts \ | |
vcodec=msmpeg4v2:vpass=1 \ | |
-vf scale=1920:1080 -mf type=jpeg:fps=24 \ | |
mf://$IMAGEPATH/*.jpg -o $VIDEOFILE |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
connector rpi | |
39 gnd green | |
37 red gpio25 r2 | |
35 brown gpio24 r3 | |
33 yellow gpio23 r4 | |
31 orange gpio22 r1 | |
31 black gpio21 r5 | |
connector relay | |
left->right |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
D:\miner\0.3.4b\miner.exe --server zec-eu1.nanopool.org --user t1MRH7R3ZxzN4pahSBhNdNcDiagjaMqSe8J.tamadapc/[email protected] --pass z --port 6666 | |
t1MRH7R3ZxzN4pahSBhNdNcDiagjaMqSe8J | |
[email protected] | |
tamadapc |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
View decorView = getWindow().getDecorView(); | |
decorView.setOnSystemUiVisibilityChangeListener | |
(new View.OnSystemUiVisibilityChangeListener() { | |
@Override | |
public void onSystemUiVisibilityChange(int visibility) { | |
// Note that system bars will only be "visible" if none of the | |
// LOW_PROFILE, HIDE_NAVIGATION, or FULLSCREEN flags are set. | |
if ((visibility & View.SYSTEM_UI_FLAG_FULLSCREEN) == 0) { | |
// TODO: The system bars are visible. Make any desired | |
// adjustments to your UI, such as showing the action bar or |