β ~ echo "SELECT title, datetime(last_visit_time/1000000 + (strftime('%s', '1601-01-01')),'unixepoch') last_visit_time, url from urls WHERE DATETIME (last_visit_time/1000000 + (strftime('%s', '1601-01-01')), 'unixepoch') >= DATETIME('now', '-3652 days') group by title, last_visit_time order by last_visit_time" | sqlite3 ~/.config/chromium/Default/History > ./chromium-history-$(date +%y%m%d%H%M).txt
β ~ ls -la ./chromium-history-*.txt
-rw-rw-r-- 1 vit vit 4393191 Mar 30 21:50 ./chromium-history-2203302150.txt
β ~
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# set -x # uncomment for debugging | |
pingone(){ | |
if ping -w 2 -q -c 1 192.168.1."$1" > /dev/null | |
then | |
printf "IP %s is up\n" 192.168.1."$1" | |
fi | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
β rpi # https://releases.libreelec.tv/LibreELEC-RPi4.arm-10.0.0.img.gz | |
β rpi F=LibreELEC-RPi4.arm-10.0.0.img; ls -la $F && md5sum $F | |
-rw-rw-r-- 1 vit vit 575668224 Sep 9 00:54 LibreELEC-RPi4.arm-10.0.0.img | |
0ebb5fd424275b202522ed285b3a365b LibreELEC-RPi4.arm-10.0.0.img | |
β rpi ssh root@rpi4 # 192.168.1.181 @ LibreELEC | |
~...~ | |
root@rpi4's password: <-- libreelec: default password | |
############################################## | |
# LibreELEC # | |
# https://libreelec.tv # |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Introduction | |
============ | |
This short document contains instructions on how to install QEMU and run a | |
virtual machine with the disk image provided for the _Writing Linux Kernel | |
Modules in Rust_ session of the LF Mentorship Series. | |
It assumes that you have an x86-64 system running a 64-bit Linux operating | |
system with KVM enabled. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ffmpeg -f pulse -i "$(awk '$2~/.monitor$/ {print $2; exit;}' \ | |
<(pactl list short sources))" -i <(arecord -f CD) -filter_complex \ | |
amix -acodec libmp3lame "$(date +%d%m%y%H%M%S)".mp3 |
Searching for fix for Rab13s vulnerability (AKA CVE-2023-30769: more here or here) so proudly advertised by Halborn Inc with small funny Halborn did not share the Exploit-kit code with any party
comment? :-)
So, here you are! βοΈ You do not need to pay them for any vulnerability disclosure / bug bounty! Just follow my hands π links: from CryptoCurrency's Reddit we go to Litecoin v0.21.2.2 (where LTC Team reports about Important Security Updates under this release @ Mar 2, 2023), and among their 9 commits we can find [Rate limit
The goal of this manual is:
- installing the latest Debian Bookworm distro on quite old, but great, Odroid U3 device, and
- installing and running the very simple (just actially few configuration lines + motion + curl), but battle-tested motion detection & notification surveillance camenoti solution on it.
- On host box let's download the recent odroid_u3-armv7l-bookworm.img.gz from here:
β bookworm-230507 wget https://github.com/hexdump0815/imagebuilder/releases/download/230224-05/odroid_u3-armv7l-bookworm.img.gz