All Activity

This stream auto-updates   

  1. Today
  2. Introduction This is the fourteenth episode of the “Learning Awk” series which is being produced by b-yeezi and myself. In this episode and the next I want to start looking at redirection within Awk programs. I had originally intended to cover the subject in one episode, but there is just too much. So, in the first episode I will be starting with output redirection and then in the next episode will spend some time looking at the getline command used for explicit input, often with redirection. Long notes I have provided detailed notes as usual for this episode, and these can be viewed here. Links GNU Awk User’s Guide Redirecting output of print and printf Special Files for Standard Preopened Data Streams Special File names in gawk Previous shows in this series on HPR: “Gnu Awk - Part 1” - episode 2114 “Gnu Awk - Part 2” - episode 2129 “Gnu Awk - Part 3” - episode 2143 “Gnu Awk - Part 4” - episode 2163 “Gnu Awk - Part 5” - episode 2184 “Gnu Awk - Part 6” - episode 2238 “Gnu Awk - Part 7” - episode 2330 “Gnu Awk - Part 8” - episode 2438 “Gnu Awk - Part 9” - episode 2476 “Gnu Awk - Part 10” - episode 2526 “Gnu Awk - Part 11” - episode 2554 “Gnu Awk - Part 12” - episode 2610 “Gnu Awk - Part 13” - episode 2804 Resources: ePub version of these notes Examples: awk14_fruit_data.txt, awk14_ex1.awk, awk14_ex2.awk, awk14_ex3.awk View the full article
  3. Last week
  4. I am providing hacking Tutorials and hacking Services will Teach You all about Hacking in this Course you will Learn about website , Spam , Malware , Rat Hacking here is Some details what you will learn in this course 1. You will Learn all About Virus Include PC HACKING , MOBILE HACKING 2. Learn Advance Virus HTTPS , HTTP Spoof And Hack Passwords 3. You will Learn About web Hacking In this Series i will teach you in detail about DataBase Hacking How you get Email and password and other website information 4. i will teach you how to shell a website 5. How to Hack Cpanel 6. i will teach you about CC,PayPal western union topup Credit Card Hacking in Details 7. Much More 8.Hacking,Different Kinds of Games and Software hacking,Games server files + database,Social 9.Hacking Iphone ss| SSN | Android based | ip | spying 10.WhatsApp,Facebook,Snapchat Twitter,Instagram HACK Sami.hacking@gmail.com Whatsapp : +16823025207 Discord ID: holyhck#1248 ICQ : 659 839 138
  5. You can copy and paste on Linux the same way you do on any other OS: Ctrl+C to copy and Ctrl+V to paste (or use the Edit menu, or a right-click menu). However, Linux doesn't limit you to just that. The primary GUI environment of Linux (at the time of this recording) is X, and the Inter-Client Communication Conventions Manual defines three X Selection states: Primary, Secondary, and Clipboard. The Secondary is rarely (if ever?) used, so I don't cover it here. Primary The primary X Selection is anything literally selected at any given moment. If you highlight a word in Firefox with your mouse, for instance, then it becomes the Primary Selection, and it is owned by Firefox. If you press the Middle Mouse Button in any application, then that application asks the owner (Firefox, in this example) for the data contained in the Primary Selection. Firefox sends the data to that application so that it can paste it for you. A Primary selection remains the Primary Selection until it is overwritten by a new Primary Selection. In other words, text needn't be highlighted to be retained in the Primary Selection slot. Clipboard The Clipboard Selection is data that has explicitly been sent to the clipboard by a copy action. This is usually a right-click > Copy or a selection of Edit > Copy. When another application is told to paste from the clipboard, it pastes data from the Clipboard Selection. Both You can (and often do) have both a Primary Selection and a Clipboard selection. If you press Ctrl+V, you get the contents of the Clipboard Selection. If you press the middle mouse button, then you get the contents of the Primary Selection. xsel The xsel command allows you to retrieve the contents of an X Selection. $ xsel --primary dungeons $ xsel --clipboard dragons Clipboard managers Clipboard managers such as Klipper, CopyQ, Parcellite, and so on, provide a history for your clipboard. They track the latest 10 (or so) items you have copied or selected. They can be a little confusing, because they do tend to blur the line between the Primary Selection and the Clipboard Selection, but now that you know the technical difference, it shouldn't confuse you to see them both listed by a clipboard manager designed to conflate them. GPM GPM is a daemon allowing you to use your mouse without a GUI. Among its features, it permits you to select text in a text console (TTY) and then paste it with the middle mouse button. GNU Screen and Tmux Screen and tmux are "window managers for text consoles". I don't tend to use tmux as often as I should, having learnt GNU Screen long ago, so I'm not familiar with the process of copying and pasting with tmux. For Screen, you can copy text in this way: Press Ctrl+A to get out of insert mode. Press left-square_bracket to enter copy-mode Move your text to the position you want to start selecting and press Enter or Return Arrow to the position at which you want to end your selection and press Enter or Return again To paste your selection: Press Ctrl+A to get out of insert mode. Press right-square_bracket to paste View the full article
  6. I discuss the entire Spectre and Meltdown issues and where we might go post an Intel world. My objective is to encourage others to leave Speculative processing backed by management engine based chips. SCATTER HUMANS!!! WE MUST LEAVE!!!! View the full article
  7. This isn't a huge news story but we felt it was worthy of note. As part of our overall digitization project, our team of archivists have finished the thankless task of making all of the recorded talks from our first three conferences available on flash drives and downloadable MP4s for the very first time. Previously, they were only available as DVDs and on YouTube, with all of the baggage that service brings with it. Now you can have the highest quality, fully copyable files to do with as you please. No restrictions. (Please be aware that our video skills at the time were rudimentary at best so some of these videos might be best described as studies in how far we've come.) HOPE (1994) flash drives and downloadable MP4s Beyond HOPE (1997) flash drives and downloadable MP4s H2K (2000) flash drives and downloadable MP4s We hope to continue this project to cover the remaining three conferences. At present, nine out of our 12 conferences have been published in these formats. You can explore all of what's available here and on YouTube (with their restrictions and limitations). View the full article
  8. All this comes as the 14 Days of Fortnite occasion yields. While it had been scheduled to Fortnite Items have stopped by now (and did come to a close), Epic miscommunicated the end date for the event, leading to frustration out of some who missed the chance to finish its challenges and earn rewards. Are there a Game of Thrones and Fortnite crossover event in 2019? If you're a lover of Game of Thrones and Fortnite, the idea of a crossover event between the two is guaranteed to make you excited. Such an event is unlikely to ever happen? Well, a number of in-game things and occurrences have started to catch our attention because the start of Season 7, and the inner fan theorists among us are starting to wonder just how, and if, a GoT crossover may ever work in the battle royale match. Before continuing, we must inform you that there are some Game of Thrones spoilers throughout this report. If you are not up-to-date with the season, you may not want to browse on. So, what's got us so excited about a game that is enjoyed by teenagers and under 25s along with a crossover between a few? Let us begin with the snow... "Winter is coming" is among the most well-known phrases from Game of Thrones and George R. R. Martin's'A Song of Ice and Fire' novels. To put it very simply, seasons in Westeros (Martin's envisioned world) do not work like we are utilized to. Summer can last for years and so can chilly. The Starks of Winterfell would be buy fortnite weapons the most cautious of winter's arrival and they use the phrase in conversation.
  9. With end bold bossing as a goal, what should I be absorption on RuneScape gold and exactly what accessory should I use? I bought some Aristocratic Black Knight Armour off the GE for affray training but is your meta in RS3 melee, ambit or magical? Do quests, the xp rewards will attractive abundant addition you achieved all early-game training. Your antecedence ought to be Prif and RFD and additional major-quest chains. I'd advance amphitheatre about with abilities at aboriginal to have a feel for them, afresh program rswikia to set up a able anarchy bar. It is an 1.5hr grind(4 games, 20~mins anniversary bold you get max anniversary anniversary match), but traveling into the tuska minigame and unlocking the tuska's acrimony adeptness is appealing nice. You can do it at any moment, but xp in the activities scales upward according to your corresponding from the abilities. Likewise, cutting 50-150~ avianses afterwards you apart GWD1 to get cede and adherence skills is aswell in actuality nice. Once you get 50 actions you can alpha accomplishing reaper jobs daily. It is basically bang-up apache but utilizes it's own assignment arrangement and accolade points. It's possible to wind up acrimonious up an abridged hydrix for some proper GP. You alone charge to perform 1 injury to the bang-up to get acclaim for the kill, so you can buy old school rs gold request friends/etc into admonition if it's a bang-up that you can not abandoned yet.
  10. NEW 'Off The Wall' ONLINE Posted 15 May, 2019 0:55:54 UTC The new edition of Off The Wall from 14/05/2019 has been archived and is now available online. "Off The Wall" - 14/05/2019 Download the torrent here!!!! View the full article
  11. Knightwise wonders if we should let go of the linux desktop environments and focus on cross-platform applications instead. Please bring your torches and pitchforks. View the full article
  12. This is mostly verbatim from my Fediverse post https://libranet.de/display/0b6b25a8-165c-9c7f-b55d-c7a077813050, with a few minor edits. The anti-5G campaign has been cooking for many years now, and at the epicenter of it all are two men, Lennart Hardell and Rainer Nyberg. It’s a Swedish-Finnish phenomenon that is now really making the rounds and spreading internationally, as actual commercial deployment of 5G networks draws nearer. As a Swede, I apologize. These two do not represent the Swedish or Finnish cancer or radiation research community, and our media have given them far more space in the public discourse than their work merits. They are heavily quoted in networks of pseudoscience, including anti-vaccine sites, right-wing "alternative facts" sites and Strålskyddsstiftelsen ("Swedish Radiation Protection Foundation"), a private foundation created in 2012 with a deceptive name meant to invoke authority, which has had to be corrected on multiple occasions by the actual Swedish Radiation Safety Authority, Strålskyddsmyndigheten. Strålskyddsstiftelsen received the 2013 "Misleader of the Year" award from the main Swedish scientific skeptics' society, Vetenskap och Folkbildning ("Science and Public Education") for "[their fearmongering propaganda and biased reporting on the health effects of mobile telephony use and wireless networks]". https://www.vof.se/utmarkelser/tidigare-utmarkelser/aretas-forvillare-2013/ (in Swedish) These networks are part of a feedback loop where they get media attention, politicians pick up on their claims and use them to invoke the precautionary principle and get precautionary regulation in place, or judges rule based on the claims, which then gets quoted by these entities as evidence that they were right all along. They make it very hard to find factual information on whether millimeter-wavelength radiation actually has any different effect from the centimeter-wavelength radiation that we have been using for over two decades without any documented harmful effects, because wherever you look you just find these sites claiming that we have definitely had adverse health effects for the last two decades and the new frequency bands will definitely be far worse. When you dig deeper into the claims on these sites you find a handful of cherry-picked articles, leading back to the two men mentioned at the top, to studies with flawed methodology like self-reported surveys on mobile telephony use among cancer patients, or to the pseudoscience/media/politics/law feedback loop. And it’s all about centimeter waves, which simply have shown no conclusive sign of increasing brain cancers or any other adverse health effect related to the radiation. For every positive report made you can find one that reports brain cancer fell as we introduced mobile phones. There is a massive body of data, and if the signal were there, we would have seen it by now. I’m no cancer researcher, but neither is Rainer Nyberg, he’s a retired professor in pedagogy. He’s a concerned citizen. https://en.wikipedia.org/wiki/Lennart_Hardell is an actual oncologist and professor who has studied carcinogens, but his research results on the wireless/cancer connection have been dismissed as "non-informative", "post hoc", "barely statistically significant" and "flawed" by his peers. There is nothing there. We know that high-voltage 16.7 Hz fields increase the risk for leukemia in train drivers, but we don’t know why. I am open to the possibility that 20-50 GHz waves have different consequences from 2 GHz waves, but I’d have to hear it from a credible source. Straight up DNA mutation is out the window, and that’s one of the centerpoints of these campaigns. This is still frequencies below visual light, it’s not ionizing radiation. No plausible mechanism has been suggested, and there is no clear data on any adverse effects. We use millimeter waves for the full body scans in US airports. Surely the effects of those have been studied? The top search results go to truthaboutcancer and infowars and similar names I won’t even bother to click. I don’t want to read another article about how all cancer research after 1950 has been wrong, we should all just eat chalk to balance our acidity, and cancer is a fungus. Apart from the pseudoscience sites I found one paper on the first search results page, concluding that X-ray backscatter scanners have well-known risks, but radiation levels are far below safety standards, both for passengers and for security staff, and also below the background radiation exposure while flying, and millimeter-wave scanners, while an "alarmingly small amount of information about its potential health effects" is available, "The established health effects associated with non-ionizing radiation are limited to thermal effects" and "these scanners operate at outputs well below those required to produce tissue heating", that is, we currently don’t know of a way millimeter waves might be harmful: https://www.sciencedirect.com/science/article/pii/S1687850714000168 (https://doi.org/10.1016/j.jrras.2014.02.005) For a guide on how to spot pseudoscience and how to read scientific papers, see ahuka’s excellent hpr2695: Problems with Studies. https://en.wikipedia.org/wiki/Betteridge%27s_Law_of_Headlines View the full article
  13. Earlier
  14. A few years ago, when you wanted to install a package on your Linux system, you had to grab the source code, and the nightmare began. But nowadays, this is over. You have deb files, and snaps, and flatpacks, and many other package formats available. On this episode, I was joined by Alan Pope, from Canonical, to talk about one of them in particular : snaps. View the full article
  15. Background You're running a firewall on your work and home networks right, so of course you're running one on your Smart Phone. Given this device holds more information about you than you probably know yourself, it would be only prudent to make sure that you are protecting what gets in but also what gets out. I run AFWall+ which is available from the F-Droid app store. It runs fine on LineageOS. I then set it on the children's phone so that no application is allowed to use mobile data, and then only applications that need Internet get Internet Access. This works well as it's a normal use case for mobile applications to have intermittent access to the Internet. I see no reason why the Linux Kernel should need unfettered access to the Internet, so it's not allowed out. One issue you may come across is that even though you know that there is a Connection your phone doesn't, and so it will display the Wi-Fi Connected, no Internet message. I'm not sure how this check is done but abqnm suggests at in the StackExchange question How does Android determine if it has an Internet connection? that it may be related to Google Cloud Messaging. ... this means that the device is unable to receive a response from GCM (Google Cloud Messaging, the framework that handles push notifications). This traffic is sent through ports 5228, 5229, and 5230. If the AP is blocking or interfering with traffic on those ports, push notifications won't work ... I do indeed see blocked attempts by Google Play Services on my own phone, but not on the other phones that have no google services installed. The only entry I see in the logs is an ICMP attempt to "Comcast Cable Communications, Inc". If you know more please record a show for Hacker Public Radio about it. Giving Access Normally you will get a message saying that the Wi-Fi has no Internet access. If you tap the message a popup will allow you to stay connected and will let you remember the choice. In some cases the router helpfully resets the connection before you can reply to the message meaning it goes into a loop continually popping up the message but not reacting to it. In this case we can use Termux a Android Terminal emulator, to drop to a shell and fix the problem. I used su to get root access but you could also change to the user wifi. The file you need to edit is /data/misc/wifi/wpa_supplicant.conf. It's probably best to edit this file with the wifi off. network={ ssid="OpenWireless.Org" key_mgmt=NONE priority=15 id_str="{snip}" } Scroll down to the network that is giving you trouble and add disabled=1 network={ ssid="OpenWireless.Org" key_mgmt=NONE priority=15 disabled=1 id_str="{snip}" } I ended up copying the file to the sdcard, and editing it there. I then copied it back as su and used chown wifi:wifi /data/misc/wifi/wpa_supplicant.conf to fix the permissions. Once that's done you can reboot the phone and connect to the network without a problem. You should also consider putting up an Open Wireless access point yourself. View the full article
  16. NEW 'Off The Hook' ONLINE Posted 09 May, 2019 2:53:47 UTC The new edition of Off The Hook from 08/05/2019 has been archived and is now available online. "Off The Hook" - 08/05/2019 Download the torrent here!!!! View the full article
  17. The Blue Oak Model License 1.0.0 was just released this month. In this episode I read the license, explain where it sits in among other software licenses, and enumerate some of the problems it purports to solve. I’m no legal expert, so take all of this as sort of a rough introduction to the license. Overall, if you are looking at permissive (vs copyleft) licenses, I would strongly suggest you consider this license! It’s concise, robust, it was developed by credible people, and gives your users future-proof safety from a number of common legal traps. However: just note that it has a feature, some would say bug, that might be a big deciding factor in whether you feel comfortable with it (listen for details) Nevertheless, I believe this license, or at least its style of language, will soon become extremely common. Further links: The Blue Oak Model License 1.0.0 — the license itself. You may also wish to read the group’s statement about their methodology and how the license came to be. Deprecation Notice: MIT and BSD — the blog post I mention in the recording, by Blue Oak council member, developer and IP lawyer Kyle Mitchell. He explains some problems he sees with the MIT and BSD licenses and how the BOML addresses them. Discussion on Hacker News — This was a pretty good discussion. Kyle Mitchell also chimed in here to respond to some criticisms and tire-kicking of this license (you can recognize him by his handle kemitchell). Not mentioned in the recording: One thing that caused me a bit of confusion at first was the term “attribution”. Kyle and the Blue Oak folks use this term mainly to talk about license terms, not authorship or credit. So for them an attribution requirement is a requirement to include the license terms with any distributed copies, not a requirement to give authorship credit to people. If you want to use this license as a starting point for your own “bespoke” license, you can! As I mention in the recording, I created my own variant of the Blue Oak license for one of my own projects. My main change was a strong requirement for downstream users to give credit to upstream contributors—not just when redistributing source code, but in all published software, books and websites created with the software! The Local Yarn License 1.0.0 — This is the license as it currently sits in an experimental branch in my project’s Fossil repository Notes about my customizations — Another tech note from the Fossil repo. Of course, when you make your own changes, you had better think hard about them, and if possible, get the advice of an Actual Lawyer who can discuss your particular situation. View the full article
  18. As many of you are aware, it has become increasingly difficult to survive in the publishing world. Digitization of media is one challenge that magazines can either embrace or fight. The perception that people are reading less these days is also cause for concern. And the decline of bookstores due to large chains moving in and then shutting down is another ominous trend. It's that latter circumstance that has hurt us the most. (We're continuing to expand our digital options and we find that our readers are reading more than ever, so the first two aren't threats to us.) When people can't find us in the retail stores that remain, that's a big problem. Earlier this year, we started the process of adding 2600 to stores throughout the United Kingdom at the request of many of our readers. Previously, we were prominently displayed on shelves throughout the country. As referenced above, many chains that carried us (such as Borders and Virgin Megastore) are no longer around. Since then, the distributor environment has become significantly more hostile to publishers, requiring new fees for the privilege of being stocked, a majority of the sale price to go to the store and distributor, and exorbitant delivery charges to be borne by the publisher. Despite all of this, we felt we owed it to our many readers in the U.K. to at least try to survive in this marketplace. This Tuesday, we got our hands on a letter from a representative from Seymour Distribution Ltd. to our American distributor with reasons why we were being denied consideration. We reproduce it below. ----------------------------------------------------------------------------------------------------------------------- The rational for taking any import title is based on the following criteria: 1) What is the possible sales volume we can achieve based upon the business plan of the publisher. This includes above and below the line marketing plan, the UK cover price and the quality of the publication compared to others in the market place. 2) Is the subject matter likely to cause any negative publicity or consumer complaints. Is the magazine compliant with all aspects of UK Law. In the event of point 2 some retailers such as WH Smith High Street, our largest retailer of specialist goods have in the contract they can charge the publisher per complaint and fine the publisher up to £10,000 plus any cost they may incur on recalling the title such they decide this is necessary. In this circumstance, based upon the content being such that it may cause complaints we decline your offer of distribution. ----------------------------------------------------------------------------------------------------------------------- We see this as a very ominous development. Where once we were able to be displayed in stores, now we're barred due to concern over controversy. As the above letter shows, there is no concern over potential sales figures or reader interest. Those have not changed. What has changed is the diversity and level of speech that is now permitted in United Kingdom bookstores. This is not just about us. It affects anyone who dares to publish even slightly controversial material. We have no doubt this policy has already had a chilling effect on many publications and is in no small part leading to their reduction. After all, if people can't see the magazines, how do they know they even exist? We apologize to our readers in the U.K. for our failure to return to bookstores in your country. We ask that you spread this information widely so that people are aware of the restrictions affecting your freedom to read material of your choice. And, of course, you can always subscribe. They haven't (yet) figured out a way to stop that. For now, we are focusing on strengthening our U.S. distribution so that something similar doesn't happen here. The help and support of our readers will be invaluable in these efforts. View the full article
  19. NEW 'Off The Wall' ONLINE Posted 08 May, 2019 0:59:19 UTC The new edition of Off The Wall from 07/05/2019 has been archived and is now available online. "Off The Wall" - 07/05/2019 Download the torrent here!!!! View the full article
  20. Haskell is statically typed language, meaning that during compilation, programs are checked for type correctness. This means that you won’t accidentally mix for example text and numbers. Haskell does type inference. The compiler will try and figure out what kind of types would make your program to be valid in terms of types. Programmer could completely omit types, but it’s often helpful to write type signatures for at least top level definitions. These will be helpful for both the programmers and compilers. concrete types Simplest case is where types are spelled out definitely. Function add below takes two Integer parameters and produces Integer value. Note that types are written in upper case. add :: Integer -> Integer -> Integer It’s possible to not use concrete types. In following example a (note the lower case) can be anything. So function takes two values of a, a Boolea and produces a. This is useful technique for writing very general functions. choose :: a -> a -> Boolean -> a ad hoc polymorphism In previous example, we wouldn’t be able to do much at all with a as we don’t know its type. Sometimes we need to know a bit more about type, without specifically declaring its type. For those cases type constraints are useful. add :: (Num a) => a -> a -> a This version of add again takes two parameters, both being type a and produces value a. But (Num a) => part in the signature constraints a to be instance of Num. This type class (I’ll talk about these some other time) defines that each instance of it will have set of functions: +, -, *, negate, abs, signum and fromInteger. So now our add function can use those functions, regardless of what specific type a is. parametrized functions Types used in function signature can be parametrized. If we wanted a function that returns a first element of any list, we could have following signature: first :: [a] -> Maybe a first takes single parameter, list of a and returns Maybe a. Maybe is a type that is used to signify a value that might or might not be present and has following definition: data Maybe a = Nothing | Just a So our function would return Nothing when given an empty list and Just a when given a list of at least one element. using functions Function application in Haskell doesn’t require parentheses around arguments. Calling our add function is just add 1 2. If one of the values is result of another function call, we need to tell which parameters belong to which function. Using $ is one option: add 1 $ add 2 3, another option is to use parentheses: add 1 (add 2 3). When function is called with less parameters than it expect, instead of run time error you’ll going to receive a function. In following example addLots 5 will produce same value as add 1000 5: addLots = add 1000 addLots 5 Another contrived example of partial application: findPodcasts :: [Podcast] -> Text -> [Podcast] search = findPodcasts loadedPodcasts myPodcasts = search "tuturto" functions as types Functions have type (that’s what the signature is for after all) and functions can be used as values. You can return function from another function or you can pass in a function as a parameter. Common example is filter, which has following signature: filter :: (a -> Bool) -> [a] -> [a] It takes two parameters, first one is function that has type a -> Bool and second one is list of a. Return value is list of a. You can produce a list of odd numbers between 1 and 10 with filter odd [1..10]. anonymous functions Sometimes you need a function to pass in as a parameter, but the function is so small that you don’t want to give it a name. For those cases, anonymous function are good. If you wanted to produce a list of odd numbers that are greater that 5 in range from 1 10, you could write it as: filter (\x -> odd x && x > 5) [1..10]. If you squint hard enough \ looks almost like a lowercase greek letter λ. Easiest way to catch me is either email or fediverse where I’m tuturto@mastodon.social View the full article
  21. https://en.wikipedia.org/wiki/Scope_%28computer_science%29 In hpr2739, Dave talked briefly about local variables. But what are they? In most modern languages, especially in compiled languages, "local" means that the value of a variable cannot be directly known, by looking up the name, outside the bounds of that function, but that’s not how it works in bash. Languages like C and Python have lexical scope. Lexical scope means local variables are local in the text. The names are local. If I’m writing code that is textually located outside the function, I cannot even describe how to access the variables within the function, because myvariable in my function is not the same variable, not the same place, as myvariable in your function. Languages like Bash and Elisp have dynamic scope. That means local variables are local in time. The names are global. What happens when you declare a variable local in bash is that the existing value of that variable is stowed away, to be brought back when your function exits. #!/usr/bin/env bash function sayscope() { echo The scope is $whatsmyscope } function globalscope() { whatsmyscope=global } function dynamicscope() { whatsmyscope=dynamic } function localscope() { local whatsmyscope=local sayscope dynamicscope sayscope } globalscope sayscope localscope sayscope The scope is global The scope is local The scope is dynamic The scope is global Perl has both, and it calls them local (dynamic scope, like bash) and my (lexical scope): #!/usr/bin/env perl use v5.10; sub sayscope { say "Dynamic scope is $whatsmyscope"; } sub globalscope { $whatsmyscope="global"; } sub dynamicscope { $whatsmyscope="dynamic"; } sub lexicalscope { my $whatsmyscope="lexical"; say "Lexical scope is $whatsmyscope"; sayscope; } sub localscope { local $whatsmyscope="local"; sayscope; dynamicscope; sayscope; lexicalscope; } globalscope; sayscope; localscope; sayscope; Dynamic scope is global Dynamic scope is local Dynamic scope is dynamic Lexical scope is lexical Dynamic scope is dynamic Dynamic scope is global You almost never want to use local in Perl, it’s mostly there for historical reasons — lexical scope is a Perl 5 feature. https://perl.plover.com/local.html covers well the remaining few and narrow exceptions where local might be useful. As dynamic scope has some valid use, it’s available in some otherwise lexically scoped languages. For example, Common LISP has the special form, and several Schemes and Racket have parameter objects: http://www.lispworks.com/documentation/HyperSpec/Body/d_specia.htm https://srfi.schemers.org/srfi-39/srfi-39.html https://docs.racket-lang.org/reference/parameters.html To dig fully into the history and flora of dynamic and lexical scope merits another episode. View the full article
  22. New hosts There were no new hosts this month. Last Month's Shows Id Day Date Title Host 2781 Mon 2019-04-01 HPR Community News for March 2019 HPR Volunteers 2782 Tue 2019-04-02 Never stop gaming klaatu 2783 Wed 2019-04-03 The Windows "Shutdown.exe" Command Explained Claudio Miranda 2784 Thu 2019-04-04 The Yamaha Disklavier Jon Kulp 2785 Fri 2019-04-05 What is uCPE JWP 2786 Mon 2019-04-08 My YouTube Channels Tony Hughes AKA TonyH1212 2787 Tue 2019-04-09 NodeJS Part 1 operat0r 2788 Wed 2019-04-10 Looping in Haskell tuturto 2789 Thu 2019-04-11 Pacing In Storytelling lostnbronx 2790 Fri 2019-04-12 My YouTube Subscriptions #5 Ahuka 2791 Mon 2019-04-15 LUKS like truecrypt klaatu 2792 Tue 2019-04-16 Playing around with text to speech synthesis on Linux Jeroen Baten 2793 Wed 2019-04-17 bash coproc: the future (2009) is here clacke 2794 Thu 2019-04-18 Interview with Martin Wimpress Yannick the french guy from Switzerland 2795 Fri 2019-04-19 Dead Earth klaatu 2796 Mon 2019-04-22 IRS,Credit Freezes and Junk Mail Ohh My! operat0r 2797 Tue 2019-04-23 Writing Web Game in Haskell - Simulation at high level tuturto 2798 Wed 2019-04-24 Should Podcasters be Pirates ? knightwise 2799 Thu 2019-04-25 building an arduino programmer Brian in Ohio 2800 Fri 2019-04-26 My YouTube Subscriptions #6 Ahuka 2801 Mon 2019-04-29 Guitar Set Up Part 1. NYbill 2802 Tue 2019-04-30 Mid-life (?) assessment clacke Comments this month These are comments which have been made during the past month, either to shows released during the month or to past shows. There are 23 comments in total. Past shows There are 4 comments on 4 previous shows: hpr2457 (2018-01-02) "Getting ready for my new Macbook Pro" by knightwise. Comment 1: Bart on 2019-04-25: "aren't you forgetting a hub?" hpr2739 (2019-01-31) "Bash Tips - 19" by Dave Morriss. Comment 1: clacke on 2019-04-01: "local" hpr2774 (2019-03-21) "CJDNS and Yggdrasil" by aldenp. Comment 5: clacke on 2019-04-01: "Yggdrasil pronunciation" hpr2779 (2019-03-28) "HTTP, IPFS, and torrents" by aldenp. Comment 2: clacke on 2019-04-01: "audio quality" This month's shows There are 19 comments on 7 of this month's shows: hpr2783 (2019-04-03) "The Windows "Shutdown.exe" Command Explained" by Claudio Miranda. Comment 1: Bubba on 2019-04-04: "Shutdown.exe command" Comment 2: ClaudioM on 2019-04-06: "Also Useful with PsExec from Sysinternals Suite" hpr2784 (2019-04-04) "The Yamaha Disklavier" by Jon Kulp. Comment 1: tuturto on 2019-04-04: "music to ears" Comment 2: Jan on 2019-04-04: "Translations" Comment 3: Jon Kulp on 2019-04-04: "Ok but it wasn't the "Well-Tempered Piano"" Comment 4: Gavtres on 2019-04-05: "So cool!" Comment 5: Dave Morriss on 2019-04-05: "What a wonderful device!" Comment 6: Guy on 2019-04-06: "How far away are you?" Comment 7: Jon Kulp on 2019-04-06: ""or" not "of"" Comment 8: Windigo on 2019-04-14: "Library of Congress" Comment 9: Jon Kulp on 2019-04-15: "A great summer job" Comment 10: Jon Kulp on 2019-04-18: "Older near-perfect player pianos" hpr2787 (2019-04-09) "NodeJS Part 1" by operat0r. Comment 1: tuturto on 2019-04-10: "looking for more" hpr2789 (2019-04-11) "Pacing In Storytelling" by lostnbronx. Comment 1: tuturto on 2019-04-11: "what about non-fictional stories" hpr2793 (2019-04-17) "bash coproc: the future (2009) is here" by clacke. Comment 1: Dave Morriss on 2019-04-22: "I really enjoyed this!" hpr2796 (2019-04-22) "IRS,Credit Freezes and Junk Mail Ohh My!" by operat0r. Comment 1: cogoman on 2019-04-25: "Credit card security" hpr2798 (2019-04-24) "Should Podcasters be Pirates ?" by knightwise. Comment 1: tuturto on 2019-04-24: "Yarrr, record me episodes" Comment 2: Dave Morriss on 2019-04-27: "Memories of early podcasts and pirate radio" Comment 3: DudeNamedBen on 2019-04-29: "Da Podfather, Adam Curry" Mailing List discussions Policy decisions surrounding HPR are taken by the community as a whole. This discussion takes place on the Mail List which is open to all HPR listeners and contributors. The discussions are open and available on the HPR server under Mailman. The threaded discussions this month can be found here: http://hackerpublicradio.org/pipermail/hpr_hackerpublicradio.org/2019-April/thread.html Events Calendar With the kind permission of LWN.net we are linking to The LWN.net Community Calendar. Quoting the site: This is the LWN.net community event calendar, where we track events of interest to people using and developing Linux and free software. Clicking on individual events will take you to the appropriate web page. Any other business HPR on Wikipedia Please see the draft at https://en.wikipedia.org/w/index.php?title=Draft:Hacker_Public_Radio If you are not already a host, then please help improve the site. Tags and Summaries Thanks to the following contributor for sending in updates in the past month: Tony Hughes Over the period tags and/or summaries have been added to 36 shows which were without them. If you would like to contribute to the tag/summary project visit the summary page at https://hackerpublicradio.org/report_missing_tags.php and follow the instructions there. View the full article
  23. You want to know what is hidden from you? the process 1. Clone victim whatsapp# 2. All mobile playstore or applestore has clone whatsapp app With all this, we have 100% whatsapp hack Reach me through I C Q(72 409 357 5) (watsapp) +1 815627 6442 Chat me up for more informations
  24. I see its been a little slow here. Oh well. Hi everyone! Hope there are still some people around these days. I see WH4F has been taken down, that stinks. Good to be back! If any other old school users are out there give me a shout!
  25. I had recently found a discord server with conversations on phreaking, interesting numbers, switching, etc... nice group of folks but as of this morning it appears to be gone.... I believe some of the folks there also hang out here so I thought I would mention it to get the scoop...... anyone?? beuhler?
  26. Hallo this is again Tony Hughes for HPR. This is an auspicious show for me as it’s my 50th show that I have recorded and released on HPR in my own right. However prior to my 1st show in my own right I did guest on 2 shows. The first of these was: hpr0844 :: The Flying Handbag hosted by HPR Volunteers Released: 2011-10-26 Which was a show that was recorded at Barcamp Blackpool in 2011, when a group of us got together to record a podcast, the hilarious thing was that the only place we could find to record was a stairwell which happened to be next to the toilets, definitely not family friendly but if you want a laugh have a listen. The next show I appeared on was an interview I did with Ken Fallon at my first OggCamp in the same year. hpr0863 :: Tony Hughes Free Cycle hosted by Ken Fallon Released: 2011-11-22. Ken was as usual trying to recruit new hosts and interviewed me with the hope that I would become one. Well I did but it took another 5 years before I finally recorded my first show in my own right. First just to say the idea for this show comes from hpr2700 in which Ken created a script to automate the bot voice reading a list of every show that has been released on HPR, so to celebrate my 50th Show I thought I would list my shows but with me running through them and do a brief summary of the show where appropriate. hpr2051 :: My Linux Journey Released on 2016-06-13 in this episode I talked about my journey in computing and starting to use Linux hpr2056 :: Interview with a young hacker Released on 2016-06-20 This was my first of several interviews with @All_about_Code at my local Raspberry Jam hpr2065 :: Whats in My Bag Released on 2016-07-01 Looking at this show so tells me I have to redo this show as my bag is very different these days hpr2076 :: What Magazines I read Part 1 Released on 2016-07-18 just what the title said, I talked about the magazines I was reading at that point in time. hpr2087 :: Magazines I read Part 2 Released on 2016-08-02 This was a follow up of the last show hpr2097 :: New Toys Released on 2016-08-16 I talked about my hardware journey over the last 30 odd years and talked about the i7 system I had just bought 2nd hand hpr2101 :: What’s on my podcatcher Released on 2016-08-22 A show about the podcasts I listen to. hpr2144 :: An Interview with All About Code at Manchester BarCamp Released on 2016-10-20 a follow up interview with Josh hpr2151 :: BarCamp Manchester part 2 Released on 2016-10-31 An interview with Claire, the organiser of BarCamp Manchester. hpr2157 :: BarCamp Manchester part 3 Released on 2016-11-08 This was an interview with Alan O’Donohoe who had started the Raspberry Jam movement hpr2257 :: Watt OS Released on 2017-03-28 Acer Aspire One Netbook – Review hpr2265 :: WattOS on Lenovo X61s Released on 2017 Lenovo X61s – Review hpr2271 :: Raspberry Pi Zero W Released on 2017-04-17 Review Episode on the then New Pi Zero W hpr2280 :: Lenovo X61s Part 2 Released on 2017-04-28 Follow up review after a SSD upgrade and using Linux Lite hpr2286 :: Surviving a Stroke Released on 2017-05-08 A very personal episode about my surviving a Stroke in February 2017 hpr2295 :: MX Linux Released on 2017-05-19 A review episode using this OS on a Lenovo X230i after a hardware boot issue with Linux Mint and an SSD hpr2331 :: Liverpool Makefest 2017 Show 1 Released on 2017-07-10 The first of a number of interview shows from the 2017 Liverpool Makefest hpr2336 :: Liverpool Makefest 2017 Show 2 Released on 2017-07-17 hpr2341 :: Liverpool Makefest 2017 Show 3 Released on 2017-07-24 hpr2346 :: Liverpool Makefest 2017 Show 4 Released on 2017-07-31 hpr2352 :: Liverpool Makefest 2017 Show 5 Released on 2017-08-08 hpr2362 :: Raspbian X86 on Lenovo x61s Released on 2017-08-22 Review of Raspbian X86 on a Lenovo X61s hpr2366 :: Making Bramble Jelly Released on 2017-08-28 Just what it says on the tin I talk about making Bramble jelly, hpr2374 :: How to Make Sauerkraut Released on 2017-09-07 Another food show on how to make Sauerkraut hpr2380 :: Raspbian X86 on P4 Tower Released on 2017-09-15 Follow up this time running Raspbian X86 on an old P4 Tower hpr2405 :: Nokia 6 Review Released on 2017-10-20 I reviewed my new phone hpr2432 :: Living with the Nokia 6 – an update to HPR 2405 Released on 2017-11-28 Follow up update show having lived with the phone for a couple of months. hpr2442 :: The sound of Woodbrooke Quaker Study centre in the Spring Released on 2017-12-12 This was a soundscape recording I made at Woodbrooke Quaker Study Centre in Birmingham UK while I was there in April 2017. hpr2579 :: Ubuntu 18.04 Mate Released on 2018-06-21 A review of the recently released Ubuntu 18.04 Mate hpr2590 :: Blowing a PC Power Supply Released on 2018-07-06 A show about how not to blow your PC power supply hpr2595 :: New laptop bargain? Released on 2018-07-13 A review on my recently purchased secondhand Toshiba Z30 laptop hpr2601 :: Liverpool Makerfest 2018 Released on 2018-07-23 Chris Dell hpr2606 :: Liverpool Makefest 2018 - interview with Dan Lynch Released on 2018-07-30 A podcast Legend hpr2612 :: Liverpool Makefest 2018 - interview with Joe aka Concrete Dog Released on 2018-08-07 About Rocketry hpr2616 :: Liverpool Makefest 2018 - interview with Josh - A.K.A - All About Code Released on 2018-08-13. This is another short interview recorded at Liverpool Makefest, with Josh talking about EduBlocks. hpr2621 :: Liverpool Makefest 2018 - Chan’nel Thomas a.k.a little pink maker Released on 2018-08-20 I talk to Chan’nel Thomas aka little pink maker. hpr2626 :: Liverpool Makefest 2018 - interviews with Helen and Chris Released on 2018-08-27 In this episode I talk to Helen from Manchester Hackspace and Chris from Wirral Code Club hpr2632 :: Liverpool Makefest 2018 - interviews with Robert and Carl Released on 2018-09-04 In this episode I talk to Robert from Roberts Workshop and Carl from Edgehill University hpr2636 :: Liverpool Makefest 2018 - interviews with Noel from JMU FabLab Released on 2018-09-10 hpr2641 :: Liverpool Makefest 2018 - interview with Rachel from the MicroBit Foundation Released on 2018-09-17 hpr2646 :: Liverpool Makefest 2018 - Interview with Steve and Gerrard from the Liverpool Astronomical society. Released on 2018-09-24 hpr2652 :: Liverpool Makefest 2018 - Interview with Caroline and John Released on 2018-10-02 under a CC-BY-SA license. This was the final interview from Makefest 2018 in Liverpool. In this interview I interview one of the founder members of Makefest, Caroline Keep, and the Head Teacher of the school where she works, John Carling. hpr2663 :: Short review on a 2.5 inch SSD/HDD caddy Released on 2018-10-17 Quick hardware review hpr2702 :: Audacity set up and response to episode 2658 Released on 2018-12-11 I post my response to show 2658 by Dave and Al hpr2735 :: Soffritto Released on 2019-01-25 Another food show hpr2738 :: My Applications Released on 2019-01-30 This and my 47th episode were about the applications I use in Linux hpr2746 :: My software part 2 Released on 2019-02-11 hpr2772 :: My applications and software part 3 A short show about the software I use in Linux Mint hpr2786 :: My YouTube Channels A short show about some of my YouTube channels inspired by Ahuka http://hackerpublicradio.org/correspondents.php?hostid=338 View the full article
  27. Basic usage Use the FIELDWIDTHS = "n1 n2 n3 ..." annotation in the BEGIN section of an awk command to specify the widths of the fields. For instance, the following file has widths of 20, 10, and 12 characters. NAME STATE TELEPHONE John Smith WA 418-311-4111 Mary Hartford CA 319-219-4341 Evan Nolan IL 219-532-5301 Boris Ratinski NC 201-553-5555 Below is an example of processing such a file: BEGIN { FIELDWIDTHS = "20 10 12" } NR > 1 { name = $1 state = $2 phone = $3 sub(/ +$/, "", name) sub(/ +$/, "", state) sub(/ +$/, "", phone) printf("%s lives in %s. The phone number is %s.\n", name, state, phone) } Then you can run the command: awk -f process_fixed_width.awk fixed_width.txt View the full article
  28. Who has been able to sample the various brokers on this list and can be able to pick out the best one? https://bestsewingmachinereview.com/best-spinning-reel/
  1. Load more activity