β cd ~/Downloads && wget https://github.com/betaflight/betaflight-configurator/releases/download/10.10.0-RC3/betaflight-configurator_10.10.0-RC3_amd64.deb && sudo dpkg -i betaflight-configurator_10.10.0-RC3_amd64.deb
~...~
Unpacking betaflight-configurator (10.10.0-RC3) ...
dpkg: dependency problems prevent configuration of betaflight-configurator:
betaflight-configurator depends on libgconf-2-4; however:
Package libgconf-2-4 is not installed.
dpkg: error processing package betaflight-configurator (--install):
dependency problems - leaving unconfigured
Errors were encountered while processing:
β ~ cat ~/.config/helix/config.toml
# theme = "bogster"
# theme = "base16_default_dark"
# theme = "base16_default"
# theme = "base16_terminal"
# theme = "dark_plus"
theme = "my"
[editor]
Resizing of btrfs
partition (in my case it's Odroid U3
's Ubuntu Jammy
image from here) by adding extra 3GB @ 16GB SD Card connected via USB adapter to Linux Mint
box with using parted
utility. Distrib image contains 2 partitions, boot
and root
- we are working with second @ /dev/sda2
here.
β β df -h /dev/sda2
Filesystem Size Used Avail Use% Mounted on
/dev/sda2 3,0G 2,8G 21M 100% /media/vit/rootpart
β β umount /dev/sda2
β β parted -l
Model: MXT-USB Storage Device (scsi)
Disk /dev/sda: 15,9GB
The goal of this manual is:
- installing the latest Debian Bookworm distro on quite old, but great, Odroid U3 device, and
- installing and running the very simple (just actially few configuration lines + motion + curl), but battle-tested motion detection & notification surveillance camenoti solution on it.
- On host box let's download the recent odroid_u3-armv7l-bookworm.img.gz from here:
β bookworm-230507 wget https://github.com/hexdump0815/imagebuilder/releases/download/230224-05/odroid_u3-armv7l-bookworm.img.gz
Searching for fix for Rab13s vulnerability (AKA CVE-2023-30769: more here or here) so proudly advertised by Halborn Inc with small funny Halborn did not share the Exploit-kit code with any party
comment? :-)
So, here you are! βοΈ You do not need to pay them for any vulnerability disclosure / bug bounty! Just follow my hands π links: from CryptoCurrency's Reddit we go to Litecoin v0.21.2.2 (where LTC Team reports about Important Security Updates under this release @ Mar 2, 2023), and among their 9 commits we can find [Rate limit
ffmpeg -f pulse -i "$(awk '$2~/.monitor$/ {print $2; exit;}' \ | |
<(pactl list short sources))" -i <(arecord -f CD) -filter_complex \ | |
amix -acodec libmp3lame "$(date +%d%m%y%H%M%S)".mp3 |