All Activity

This stream auto-updates   

  1. Today
  2. NEW 'Off The Hook' ONLINE Posted 23 May, 2019 5:56:46 UTC The new edition of Off The Hook from 22/05/2019 has been archived and is now available online. "Off The Hook" - 22/05/2019 Download the torrent here!!!! View the full article
  3. Knightwise, in HPR 2798, made the argument that podcasts are better if they are done by "pirates", i.e. not by corporations, but by individuals with something to say. While I see some merit in this view, I think the more significant feature of podcasts is that it gets us away from "broadcasting" (shows aimed at the lowest common denominator) and towards "narrowcasting", an environment where small niche interests can find an audience and thrive since podcasting does not require a lot of resources. But I do appreciate the chance to hear some radio programs that I would not otherwise be able to listen to when they are offered as podcasts. Links: View the full article
  4. Yesterday
  5. NEW 'Off The Wall' ONLINE Posted 22 May, 2019 1:18:14 UTC The new edition of Off The Wall from 21/05/2019 has been archived and is now available online. "Off The Wall" - 21/05/2019 Download the torrent here!!!! View the full article
  6. Background This is rather large topic, so I split it in two episodes. Next one should follow in two weeks if everything goes as planned. First part is about modeling research, while second part concentrates on how things change over time. There’s three types of research: engineering, natural sciences and social sciences. Research costs points that are produced by various buildings. Implementation There’s three database tables, which are defined below: CurrentResearch type Technology progress Int factionId FactionId AvailableResearch type Technology category TopResearchCategory factionId FactionId CompletedResearch type Technology level Int factionId FactionId date Int Data types Technology is enumeration of all possible technologies. Knowing these enable player to build specific buildings and space ships, enact various laws and so on. In the end this will be (hopefully) large list of technologies. data Technology = HighSensitivitySensors | SideChannelSensors | HighTensileMaterials | SatelliteTechnology | BawleyHulls | SchoonerHulls | CaravelHulls ... deriving (Show, Read, Eq, Enum, Bounded, Ord) All research belong to one of the top categories that are shown below: data TopResearchCategory = Eng | NatSci | SocSci deriving (Show, Read, Eq, Ord) ResearchCategory is more fine grained division of research. Each of the categories is further divided into sub-categories. Only EngineeringSubField is shown below, but other two are similarly divided. data ResearchCategory = Engineering EngineeringSubField | NaturalScience NaturalScienceSubField | SocialScience SocialScienceSubField deriving (Show, Read, Eq) data EngineeringSubField = Industry | Materials | Propulsion | FieldManipulation deriving (Show, Read, Eq) ResearchScore is measure of how big some research is. It has type parameter a that is used to further quantify what kind of ResearchScore we’re talking about. newtype ResearchScore a = ResearchScore { unResearchScore :: Int } deriving (Show, Read, Eq, Ord, Num) TotalResearchScore is record of three different types of researches. I’m not sure if I should keep it as a record of three fields or if I should change it so that only one of those values can be present at any given time. data TotalResearchScore a = TotalResearchScore { totalResearchScoreEngineering :: ResearchScore EngineeringCost , totalResearchScoreNatural :: ResearchScore NaturalScienceCost , totalResearchScoreSocial :: ResearchScore SocialScienceCost } deriving (Show, Read, Eq) Following singleton values are used with ResearchScore and TotalResearchScore to quantify what kind of value we’re talking about. data EngineeringCost = EngineeringCost deriving (Show, Read, Eq) data NaturalScienceCost = NaturalScienceCost deriving (Show, Read, Eq) data SocialScienceCost = SocialScienceCost deriving (Show, Read, Eq) data ResearchCost = ResearchCost deriving (Show, Read, Eq) data ResearchProduction = ResearchProduction deriving (Show, Read, Eq) data ResearchLeft = ResearchLeft deriving (Show, Read, Eq) Finally there’s Research, which is a record that uses many of the types introduced earlier. It describes what Technology is unlocked upon completion, what’s the cost is and if there are any technologies that have to have been researched before this research can start. The tier of research isn’t currently used for anything, but I have vague plans what to do about it in the future. data Research = Research { researchName :: Text , researchType :: Technology , researchCategory :: ResearchCategory , researchAntecedents :: [Technology] , researchCost :: TotalResearchScore ResearchCost , researchTier :: ResearchTier } deriving (Show, Read, Eq) Tech tree Putting all this together, we can define a list of Research. Since finding an entry from this list based on research type of it is such a common operation, we also define another data structure for this specific purpose. Map in other programming languages is often known as dictionary, associative array or hash map. It stores key-value - pairs. In our case Technology is used as key and Research as value. We define it based on the list previously defined: techMap :: Map.Map Technology Research techMap = Map.fromList $ (\x -> (researchType x, x)) <$> unTechTree techTree Next time we’ll look into how to actually use all these types and data that were defined. View the full article
  7. Last week
  8. Based on It’s pretty short, less than 4 minutes, but I think it’s important. Who defines whether you are successful, or whether your project is successful, and does it matter? View the full article
  9. Introduction This is the fourteenth episode of the “Learning Awk” series which is being produced by b-yeezi and myself. In this episode and the next I want to start looking at redirection within Awk programs. I had originally intended to cover the subject in one episode, but there is just too much. So, in the first episode I will be starting with output redirection and then in the next episode will spend some time looking at the getline command used for explicit input, often with redirection. Long notes I have provided detailed notes as usual for this episode, and these can be viewed here. Links GNU Awk User’s Guide Redirecting output of print and printf Special Files for Standard Preopened Data Streams Special File names in gawk Previous shows in this series on HPR: “Gnu Awk - Part 1” - episode 2114 “Gnu Awk - Part 2” - episode 2129 “Gnu Awk - Part 3” - episode 2143 “Gnu Awk - Part 4” - episode 2163 “Gnu Awk - Part 5” - episode 2184 “Gnu Awk - Part 6” - episode 2238 “Gnu Awk - Part 7” - episode 2330 “Gnu Awk - Part 8” - episode 2438 “Gnu Awk - Part 9” - episode 2476 “Gnu Awk - Part 10” - episode 2526 “Gnu Awk - Part 11” - episode 2554 “Gnu Awk - Part 12” - episode 2610 “Gnu Awk - Part 13” - episode 2804 Resources: ePub version of these notes Examples: awk14_fruit_data.txt, awk14_ex1.awk, awk14_ex2.awk, awk14_ex3.awk View the full article
  10. I am providing hacking Tutorials and hacking Services will Teach You all about Hacking in this Course you will Learn about website , Spam , Malware , Rat Hacking here is Some details what you will learn in this course 1. You will Learn all About Virus Include PC HACKING , MOBILE HACKING 2. Learn Advance Virus HTTPS , HTTP Spoof And Hack Passwords 3. You will Learn About web Hacking In this Series i will teach you in detail about DataBase Hacking How you get Email and password and other website information 4. i will teach you how to shell a website 5. How to Hack Cpanel 6. i will teach you about CC,PayPal western union topup Credit Card Hacking in Details 7. Much More 8.Hacking,Different Kinds of Games and Software hacking,Games server files + database,Social 9.Hacking Iphone ss| SSN | Android based | ip | spying 10.WhatsApp,Facebook,Snapchat Twitter,Instagram HACK Whatsapp : +16823025207 Discord ID: holyhck#1248 ICQ : 659 839 138
  11. You can copy and paste on Linux the same way you do on any other OS: Ctrl+C to copy and Ctrl+V to paste (or use the Edit menu, or a right-click menu). However, Linux doesn't limit you to just that. The primary GUI environment of Linux (at the time of this recording) is X, and the Inter-Client Communication Conventions Manual defines three X Selection states: Primary, Secondary, and Clipboard. The Secondary is rarely (if ever?) used, so I don't cover it here. Primary The primary X Selection is anything literally selected at any given moment. If you highlight a word in Firefox with your mouse, for instance, then it becomes the Primary Selection, and it is owned by Firefox. If you press the Middle Mouse Button in any application, then that application asks the owner (Firefox, in this example) for the data contained in the Primary Selection. Firefox sends the data to that application so that it can paste it for you. A Primary selection remains the Primary Selection until it is overwritten by a new Primary Selection. In other words, text needn't be highlighted to be retained in the Primary Selection slot. Clipboard The Clipboard Selection is data that has explicitly been sent to the clipboard by a copy action. This is usually a right-click > Copy or a selection of Edit > Copy. When another application is told to paste from the clipboard, it pastes data from the Clipboard Selection. Both You can (and often do) have both a Primary Selection and a Clipboard selection. If you press Ctrl+V, you get the contents of the Clipboard Selection. If you press the middle mouse button, then you get the contents of the Primary Selection. xsel The xsel command allows you to retrieve the contents of an X Selection. $ xsel --primary dungeons $ xsel --clipboard dragons Clipboard managers Clipboard managers such as Klipper, CopyQ, Parcellite, and so on, provide a history for your clipboard. They track the latest 10 (or so) items you have copied or selected. They can be a little confusing, because they do tend to blur the line between the Primary Selection and the Clipboard Selection, but now that you know the technical difference, it shouldn't confuse you to see them both listed by a clipboard manager designed to conflate them. GPM GPM is a daemon allowing you to use your mouse without a GUI. Among its features, it permits you to select text in a text console (TTY) and then paste it with the middle mouse button. GNU Screen and Tmux Screen and tmux are "window managers for text consoles". I don't tend to use tmux as often as I should, having learnt GNU Screen long ago, so I'm not familiar with the process of copying and pasting with tmux. For Screen, you can copy text in this way: Press Ctrl+A to get out of insert mode. Press left-square_bracket to enter copy-mode Move your text to the position you want to start selecting and press Enter or Return Arrow to the position at which you want to end your selection and press Enter or Return again To paste your selection: Press Ctrl+A to get out of insert mode. Press right-square_bracket to paste View the full article
  12. Earlier
  13. I discuss the entire Spectre and Meltdown issues and where we might go post an Intel world. My objective is to encourage others to leave Speculative processing backed by management engine based chips. SCATTER HUMANS!!! WE MUST LEAVE!!!! View the full article
  14. This isn't a huge news story but we felt it was worthy of note. As part of our overall digitization project, our team of archivists have finished the thankless task of making all of the recorded talks from our first three conferences available on flash drives and downloadable MP4s for the very first time. Previously, they were only available as DVDs and on YouTube, with all of the baggage that service brings with it. Now you can have the highest quality, fully copyable files to do with as you please. No restrictions. (Please be aware that our video skills at the time were rudimentary at best so some of these videos might be best described as studies in how far we've come.) HOPE (1994) flash drives and downloadable MP4s Beyond HOPE (1997) flash drives and downloadable MP4s H2K (2000) flash drives and downloadable MP4s We hope to continue this project to cover the remaining three conferences. At present, nine out of our 12 conferences have been published in these formats. You can explore all of what's available here and on YouTube (with their restrictions and limitations). View the full article
  15. All this comes as the 14 Days of Fortnite occasion yields. While it had been scheduled to Fortnite Items have stopped by now (and did come to a close), Epic miscommunicated the end date for the event, leading to frustration out of some who missed the chance to finish its challenges and earn rewards. Are there a Game of Thrones and Fortnite crossover event in 2019? If you're a lover of Game of Thrones and Fortnite, the idea of a crossover event between the two is guaranteed to make you excited. Such an event is unlikely to ever happen? Well, a number of in-game things and occurrences have started to catch our attention because the start of Season 7, and the inner fan theorists among us are starting to wonder just how, and if, a GoT crossover may ever work in the battle royale match. Before continuing, we must inform you that there are some Game of Thrones spoilers throughout this report. If you are not up-to-date with the season, you may not want to browse on. So, what's got us so excited about a game that is enjoyed by teenagers and under 25s along with a crossover between a few? Let us begin with the snow... "Winter is coming" is among the most well-known phrases from Game of Thrones and George R. R. Martin's'A Song of Ice and Fire' novels. To put it very simply, seasons in Westeros (Martin's envisioned world) do not work like we are utilized to. Summer can last for years and so can chilly. The Starks of Winterfell would be buy fortnite weapons the most cautious of winter's arrival and they use the phrase in conversation.
  16. With end bold bossing as a goal, what should I be absorption on RuneScape gold and exactly what accessory should I use? I bought some Aristocratic Black Knight Armour off the GE for affray training but is your meta in RS3 melee, ambit or magical? Do quests, the xp rewards will attractive abundant addition you achieved all early-game training. Your antecedence ought to be Prif and RFD and additional major-quest chains. I'd advance amphitheatre about with abilities at aboriginal to have a feel for them, afresh program rswikia to set up a able anarchy bar. It is an 1.5hr grind(4 games, 20~mins anniversary bold you get max anniversary anniversary match), but traveling into the tuska minigame and unlocking the tuska's acrimony adeptness is appealing nice. You can do it at any moment, but xp in the activities scales upward according to your corresponding from the abilities. Likewise, cutting 50-150~ avianses afterwards you apart GWD1 to get cede and adherence skills is aswell in actuality nice. Once you get 50 actions you can alpha accomplishing reaper jobs daily. It is basically bang-up apache but utilizes it's own assignment arrangement and accolade points. It's possible to wind up acrimonious up an abridged hydrix for some proper GP. You alone charge to perform 1 injury to the bang-up to get acclaim for the kill, so you can buy old school rs gold request friends/etc into admonition if it's a bang-up that you can not abandoned yet.
  17. NEW 'Off The Wall' ONLINE Posted 15 May, 2019 0:55:54 UTC The new edition of Off The Wall from 14/05/2019 has been archived and is now available online. "Off The Wall" - 14/05/2019 Download the torrent here!!!! View the full article
  18. Knightwise wonders if we should let go of the linux desktop environments and focus on cross-platform applications instead. Please bring your torches and pitchforks. View the full article
  19. This is mostly verbatim from my Fediverse post, with a few minor edits. The anti-5G campaign has been cooking for many years now, and at the epicenter of it all are two men, Lennart Hardell and Rainer Nyberg. It’s a Swedish-Finnish phenomenon that is now really making the rounds and spreading internationally, as actual commercial deployment of 5G networks draws nearer. As a Swede, I apologize. These two do not represent the Swedish or Finnish cancer or radiation research community, and our media have given them far more space in the public discourse than their work merits. They are heavily quoted in networks of pseudoscience, including anti-vaccine sites, right-wing "alternative facts" sites and Strålskyddsstiftelsen ("Swedish Radiation Protection Foundation"), a private foundation created in 2012 with a deceptive name meant to invoke authority, which has had to be corrected on multiple occasions by the actual Swedish Radiation Safety Authority, Strålskyddsmyndigheten. Strålskyddsstiftelsen received the 2013 "Misleader of the Year" award from the main Swedish scientific skeptics' society, Vetenskap och Folkbildning ("Science and Public Education") for "[their fearmongering propaganda and biased reporting on the health effects of mobile telephony use and wireless networks]". (in Swedish) These networks are part of a feedback loop where they get media attention, politicians pick up on their claims and use them to invoke the precautionary principle and get precautionary regulation in place, or judges rule based on the claims, which then gets quoted by these entities as evidence that they were right all along. They make it very hard to find factual information on whether millimeter-wavelength radiation actually has any different effect from the centimeter-wavelength radiation that we have been using for over two decades without any documented harmful effects, because wherever you look you just find these sites claiming that we have definitely had adverse health effects for the last two decades and the new frequency bands will definitely be far worse. When you dig deeper into the claims on these sites you find a handful of cherry-picked articles, leading back to the two men mentioned at the top, to studies with flawed methodology like self-reported surveys on mobile telephony use among cancer patients, or to the pseudoscience/media/politics/law feedback loop. And it’s all about centimeter waves, which simply have shown no conclusive sign of increasing brain cancers or any other adverse health effect related to the radiation. For every positive report made you can find one that reports brain cancer fell as we introduced mobile phones. There is a massive body of data, and if the signal were there, we would have seen it by now. I’m no cancer researcher, but neither is Rainer Nyberg, he’s a retired professor in pedagogy. He’s a concerned citizen. is an actual oncologist and professor who has studied carcinogens, but his research results on the wireless/cancer connection have been dismissed as "non-informative", "post hoc", "barely statistically significant" and "flawed" by his peers. There is nothing there. We know that high-voltage 16.7 Hz fields increase the risk for leukemia in train drivers, but we don’t know why. I am open to the possibility that 20-50 GHz waves have different consequences from 2 GHz waves, but I’d have to hear it from a credible source. Straight up DNA mutation is out the window, and that’s one of the centerpoints of these campaigns. This is still frequencies below visual light, it’s not ionizing radiation. No plausible mechanism has been suggested, and there is no clear data on any adverse effects. We use millimeter waves for the full body scans in US airports. Surely the effects of those have been studied? The top search results go to truthaboutcancer and infowars and similar names I won’t even bother to click. I don’t want to read another article about how all cancer research after 1950 has been wrong, we should all just eat chalk to balance our acidity, and cancer is a fungus. Apart from the pseudoscience sites I found one paper on the first search results page, concluding that X-ray backscatter scanners have well-known risks, but radiation levels are far below safety standards, both for passengers and for security staff, and also below the background radiation exposure while flying, and millimeter-wave scanners, while an "alarmingly small amount of information about its potential health effects" is available, "The established health effects associated with non-ionizing radiation are limited to thermal effects" and "these scanners operate at outputs well below those required to produce tissue heating", that is, we currently don’t know of a way millimeter waves might be harmful: ( For a guide on how to spot pseudoscience and how to read scientific papers, see ahuka’s excellent hpr2695: Problems with Studies. View the full article
  20. A few years ago, when you wanted to install a package on your Linux system, you had to grab the source code, and the nightmare began. But nowadays, this is over. You have deb files, and snaps, and flatpacks, and many other package formats available. On this episode, I was joined by Alan Pope, from Canonical, to talk about one of them in particular : snaps. View the full article
  21. Background You're running a firewall on your work and home networks right, so of course you're running one on your Smart Phone. Given this device holds more information about you than you probably know yourself, it would be only prudent to make sure that you are protecting what gets in but also what gets out. I run AFWall+ which is available from the F-Droid app store. It runs fine on LineageOS. I then set it on the children's phone so that no application is allowed to use mobile data, and then only applications that need Internet get Internet Access. This works well as it's a normal use case for mobile applications to have intermittent access to the Internet. I see no reason why the Linux Kernel should need unfettered access to the Internet, so it's not allowed out. One issue you may come across is that even though you know that there is a Connection your phone doesn't, and so it will display the Wi-Fi Connected, no Internet message. I'm not sure how this check is done but abqnm suggests at in the StackExchange question How does Android determine if it has an Internet connection? that it may be related to Google Cloud Messaging. ... this means that the device is unable to receive a response from GCM (Google Cloud Messaging, the framework that handles push notifications). This traffic is sent through ports 5228, 5229, and 5230. If the AP is blocking or interfering with traffic on those ports, push notifications won't work ... I do indeed see blocked attempts by Google Play Services on my own phone, but not on the other phones that have no google services installed. The only entry I see in the logs is an ICMP attempt to "Comcast Cable Communications, Inc". If you know more please record a show for Hacker Public Radio about it. Giving Access Normally you will get a message saying that the Wi-Fi has no Internet access. If you tap the message a popup will allow you to stay connected and will let you remember the choice. In some cases the router helpfully resets the connection before you can reply to the message meaning it goes into a loop continually popping up the message but not reacting to it. In this case we can use Termux a Android Terminal emulator, to drop to a shell and fix the problem. I used su to get root access but you could also change to the user wifi. The file you need to edit is /data/misc/wifi/wpa_supplicant.conf. It's probably best to edit this file with the wifi off. network={ ssid="OpenWireless.Org" key_mgmt=NONE priority=15 id_str="{snip}" } Scroll down to the network that is giving you trouble and add disabled=1 network={ ssid="OpenWireless.Org" key_mgmt=NONE priority=15 disabled=1 id_str="{snip}" } I ended up copying the file to the sdcard, and editing it there. I then copied it back as su and used chown wifi:wifi /data/misc/wifi/wpa_supplicant.conf to fix the permissions. Once that's done you can reboot the phone and connect to the network without a problem. You should also consider putting up an Open Wireless access point yourself. View the full article
  22. NEW 'Off The Hook' ONLINE Posted 09 May, 2019 2:53:47 UTC The new edition of Off The Hook from 08/05/2019 has been archived and is now available online. "Off The Hook" - 08/05/2019 Download the torrent here!!!! View the full article
  23. The Blue Oak Model License 1.0.0 was just released this month. In this episode I read the license, explain where it sits in among other software licenses, and enumerate some of the problems it purports to solve. I’m no legal expert, so take all of this as sort of a rough introduction to the license. Overall, if you are looking at permissive (vs copyleft) licenses, I would strongly suggest you consider this license! It’s concise, robust, it was developed by credible people, and gives your users future-proof safety from a number of common legal traps. However: just note that it has a feature, some would say bug, that might be a big deciding factor in whether you feel comfortable with it (listen for details) Nevertheless, I believe this license, or at least its style of language, will soon become extremely common. Further links: The Blue Oak Model License 1.0.0 — the license itself. You may also wish to read the group’s statement about their methodology and how the license came to be. Deprecation Notice: MIT and BSD — the blog post I mention in the recording, by Blue Oak council member, developer and IP lawyer Kyle Mitchell. He explains some problems he sees with the MIT and BSD licenses and how the BOML addresses them. Discussion on Hacker News — This was a pretty good discussion. Kyle Mitchell also chimed in here to respond to some criticisms and tire-kicking of this license (you can recognize him by his handle kemitchell). Not mentioned in the recording: One thing that caused me a bit of confusion at first was the term “attribution”. Kyle and the Blue Oak folks use this term mainly to talk about license terms, not authorship or credit. So for them an attribution requirement is a requirement to include the license terms with any distributed copies, not a requirement to give authorship credit to people. If you want to use this license as a starting point for your own “bespoke” license, you can! As I mention in the recording, I created my own variant of the Blue Oak license for one of my own projects. My main change was a strong requirement for downstream users to give credit to upstream contributors—not just when redistributing source code, but in all published software, books and websites created with the software! The Local Yarn License 1.0.0 — This is the license as it currently sits in an experimental branch in my project’s Fossil repository Notes about my customizations — Another tech note from the Fossil repo. Of course, when you make your own changes, you had better think hard about them, and if possible, get the advice of an Actual Lawyer who can discuss your particular situation. View the full article
  24. As many of you are aware, it has become increasingly difficult to survive in the publishing world. Digitization of media is one challenge that magazines can either embrace or fight. The perception that people are reading less these days is also cause for concern. And the decline of bookstores due to large chains moving in and then shutting down is another ominous trend. It's that latter circumstance that has hurt us the most. (We're continuing to expand our digital options and we find that our readers are reading more than ever, so the first two aren't threats to us.) When people can't find us in the retail stores that remain, that's a big problem. Earlier this year, we started the process of adding 2600 to stores throughout the United Kingdom at the request of many of our readers. Previously, we were prominently displayed on shelves throughout the country. As referenced above, many chains that carried us (such as Borders and Virgin Megastore) are no longer around. Since then, the distributor environment has become significantly more hostile to publishers, requiring new fees for the privilege of being stocked, a majority of the sale price to go to the store and distributor, and exorbitant delivery charges to be borne by the publisher. Despite all of this, we felt we owed it to our many readers in the U.K. to at least try to survive in this marketplace. This Tuesday, we got our hands on a letter from a representative from Seymour Distribution Ltd. to our American distributor with reasons why we were being denied consideration. We reproduce it below. ----------------------------------------------------------------------------------------------------------------------- The rational for taking any import title is based on the following criteria: 1) What is the possible sales volume we can achieve based upon the business plan of the publisher. This includes above and below the line marketing plan, the UK cover price and the quality of the publication compared to others in the market place. 2) Is the subject matter likely to cause any negative publicity or consumer complaints. Is the magazine compliant with all aspects of UK Law. In the event of point 2 some retailers such as WH Smith High Street, our largest retailer of specialist goods have in the contract they can charge the publisher per complaint and fine the publisher up to £10,000 plus any cost they may incur on recalling the title such they decide this is necessary. In this circumstance, based upon the content being such that it may cause complaints we decline your offer of distribution. ----------------------------------------------------------------------------------------------------------------------- We see this as a very ominous development. Where once we were able to be displayed in stores, now we're barred due to concern over controversy. As the above letter shows, there is no concern over potential sales figures or reader interest. Those have not changed. What has changed is the diversity and level of speech that is now permitted in United Kingdom bookstores. This is not just about us. It affects anyone who dares to publish even slightly controversial material. We have no doubt this policy has already had a chilling effect on many publications and is in no small part leading to their reduction. After all, if people can't see the magazines, how do they know they even exist? We apologize to our readers in the U.K. for our failure to return to bookstores in your country. We ask that you spread this information widely so that people are aware of the restrictions affecting your freedom to read material of your choice. And, of course, you can always subscribe. They haven't (yet) figured out a way to stop that. For now, we are focusing on strengthening our U.S. distribution so that something similar doesn't happen here. The help and support of our readers will be invaluable in these efforts. View the full article
  25. NEW 'Off The Wall' ONLINE Posted 08 May, 2019 0:59:19 UTC The new edition of Off The Wall from 07/05/2019 has been archived and is now available online. "Off The Wall" - 07/05/2019 Download the torrent here!!!! View the full article
  26. Haskell is statically typed language, meaning that during compilation, programs are checked for type correctness. This means that you won’t accidentally mix for example text and numbers. Haskell does type inference. The compiler will try and figure out what kind of types would make your program to be valid in terms of types. Programmer could completely omit types, but it’s often helpful to write type signatures for at least top level definitions. These will be helpful for both the programmers and compilers. concrete types Simplest case is where types are spelled out definitely. Function add below takes two Integer parameters and produces Integer value. Note that types are written in upper case. add :: Integer -> Integer -> Integer It’s possible to not use concrete types. In following example a (note the lower case) can be anything. So function takes two values of a, a Boolea and produces a. This is useful technique for writing very general functions. choose :: a -> a -> Boolean -> a ad hoc polymorphism In previous example, we wouldn’t be able to do much at all with a as we don’t know its type. Sometimes we need to know a bit more about type, without specifically declaring its type. For those cases type constraints are useful. add :: (Num a) => a -> a -> a This version of add again takes two parameters, both being type a and produces value a. But (Num a) => part in the signature constraints a to be instance of Num. This type class (I’ll talk about these some other time) defines that each instance of it will have set of functions: +, -, *, negate, abs, signum and fromInteger. So now our add function can use those functions, regardless of what specific type a is. parametrized functions Types used in function signature can be parametrized. If we wanted a function that returns a first element of any list, we could have following signature: first :: [a] -> Maybe a first takes single parameter, list of a and returns Maybe a. Maybe is a type that is used to signify a value that might or might not be present and has following definition: data Maybe a = Nothing | Just a So our function would return Nothing when given an empty list and Just a when given a list of at least one element. using functions Function application in Haskell doesn’t require parentheses around arguments. Calling our add function is just add 1 2. If one of the values is result of another function call, we need to tell which parameters belong to which function. Using $ is one option: add 1 $ add 2 3, another option is to use parentheses: add 1 (add 2 3). When function is called with less parameters than it expect, instead of run time error you’ll going to receive a function. In following example addLots 5 will produce same value as add 1000 5: addLots = add 1000 addLots 5 Another contrived example of partial application: findPodcasts :: [Podcast] -> Text -> [Podcast] search = findPodcasts loadedPodcasts myPodcasts = search "tuturto" functions as types Functions have type (that’s what the signature is for after all) and functions can be used as values. You can return function from another function or you can pass in a function as a parameter. Common example is filter, which has following signature: filter :: (a -> Bool) -> [a] -> [a] It takes two parameters, first one is function that has type a -> Bool and second one is list of a. Return value is list of a. You can produce a list of odd numbers between 1 and 10 with filter odd [1..10]. anonymous functions Sometimes you need a function to pass in as a parameter, but the function is so small that you don’t want to give it a name. For those cases, anonymous function are good. If you wanted to produce a list of odd numbers that are greater that 5 in range from 1 10, you could write it as: filter (\x -> odd x && x > 5) [1..10]. If you squint hard enough \ looks almost like a lowercase greek letter λ. Easiest way to catch me is either email or fediverse where I’m View the full article
  27. In hpr2739, Dave talked briefly about local variables. But what are they? In most modern languages, especially in compiled languages, "local" means that the value of a variable cannot be directly known, by looking up the name, outside the bounds of that function, but that’s not how it works in bash. Languages like C and Python have lexical scope. Lexical scope means local variables are local in the text. The names are local. If I’m writing code that is textually located outside the function, I cannot even describe how to access the variables within the function, because myvariable in my function is not the same variable, not the same place, as myvariable in your function. Languages like Bash and Elisp have dynamic scope. That means local variables are local in time. The names are global. What happens when you declare a variable local in bash is that the existing value of that variable is stowed away, to be brought back when your function exits. #!/usr/bin/env bash function sayscope() { echo The scope is $whatsmyscope } function globalscope() { whatsmyscope=global } function dynamicscope() { whatsmyscope=dynamic } function localscope() { local whatsmyscope=local sayscope dynamicscope sayscope } globalscope sayscope localscope sayscope The scope is global The scope is local The scope is dynamic The scope is global Perl has both, and it calls them local (dynamic scope, like bash) and my (lexical scope): #!/usr/bin/env perl use v5.10; sub sayscope { say "Dynamic scope is $whatsmyscope"; } sub globalscope { $whatsmyscope="global"; } sub dynamicscope { $whatsmyscope="dynamic"; } sub lexicalscope { my $whatsmyscope="lexical"; say "Lexical scope is $whatsmyscope"; sayscope; } sub localscope { local $whatsmyscope="local"; sayscope; dynamicscope; sayscope; lexicalscope; } globalscope; sayscope; localscope; sayscope; Dynamic scope is global Dynamic scope is local Dynamic scope is dynamic Lexical scope is lexical Dynamic scope is dynamic Dynamic scope is global You almost never want to use local in Perl, it’s mostly there for historical reasons — lexical scope is a Perl 5 feature. covers well the remaining few and narrow exceptions where local might be useful. As dynamic scope has some valid use, it’s available in some otherwise lexically scoped languages. For example, Common LISP has the special form, and several Schemes and Racket have parameter objects: To dig fully into the history and flora of dynamic and lexical scope merits another episode. View the full article
  28. New hosts There were no new hosts this month. Last Month's Shows Id Day Date Title Host 2781 Mon 2019-04-01 HPR Community News for March 2019 HPR Volunteers 2782 Tue 2019-04-02 Never stop gaming klaatu 2783 Wed 2019-04-03 The Windows "Shutdown.exe" Command Explained Claudio Miranda 2784 Thu 2019-04-04 The Yamaha Disklavier Jon Kulp 2785 Fri 2019-04-05 What is uCPE JWP 2786 Mon 2019-04-08 My YouTube Channels Tony Hughes AKA TonyH1212 2787 Tue 2019-04-09 NodeJS Part 1 operat0r 2788 Wed 2019-04-10 Looping in Haskell tuturto 2789 Thu 2019-04-11 Pacing In Storytelling lostnbronx 2790 Fri 2019-04-12 My YouTube Subscriptions #5 Ahuka 2791 Mon 2019-04-15 LUKS like truecrypt klaatu 2792 Tue 2019-04-16 Playing around with text to speech synthesis on Linux Jeroen Baten 2793 Wed 2019-04-17 bash coproc: the future (2009) is here clacke 2794 Thu 2019-04-18 Interview with Martin Wimpress Yannick the french guy from Switzerland 2795 Fri 2019-04-19 Dead Earth klaatu 2796 Mon 2019-04-22 IRS,Credit Freezes and Junk Mail Ohh My! operat0r 2797 Tue 2019-04-23 Writing Web Game in Haskell - Simulation at high level tuturto 2798 Wed 2019-04-24 Should Podcasters be Pirates ? knightwise 2799 Thu 2019-04-25 building an arduino programmer Brian in Ohio 2800 Fri 2019-04-26 My YouTube Subscriptions #6 Ahuka 2801 Mon 2019-04-29 Guitar Set Up Part 1. NYbill 2802 Tue 2019-04-30 Mid-life (?) assessment clacke Comments this month These are comments which have been made during the past month, either to shows released during the month or to past shows. There are 23 comments in total. Past shows There are 4 comments on 4 previous shows: hpr2457 (2018-01-02) "Getting ready for my new Macbook Pro" by knightwise. Comment 1: Bart on 2019-04-25: "aren't you forgetting a hub?" hpr2739 (2019-01-31) "Bash Tips - 19" by Dave Morriss. Comment 1: clacke on 2019-04-01: "local" hpr2774 (2019-03-21) "CJDNS and Yggdrasil" by aldenp. Comment 5: clacke on 2019-04-01: "Yggdrasil pronunciation" hpr2779 (2019-03-28) "HTTP, IPFS, and torrents" by aldenp. Comment 2: clacke on 2019-04-01: "audio quality" This month's shows There are 19 comments on 7 of this month's shows: hpr2783 (2019-04-03) "The Windows "Shutdown.exe" Command Explained" by Claudio Miranda. Comment 1: Bubba on 2019-04-04: "Shutdown.exe command" Comment 2: ClaudioM on 2019-04-06: "Also Useful with PsExec from Sysinternals Suite" hpr2784 (2019-04-04) "The Yamaha Disklavier" by Jon Kulp. Comment 1: tuturto on 2019-04-04: "music to ears" Comment 2: Jan on 2019-04-04: "Translations" Comment 3: Jon Kulp on 2019-04-04: "Ok but it wasn't the "Well-Tempered Piano"" Comment 4: Gavtres on 2019-04-05: "So cool!" Comment 5: Dave Morriss on 2019-04-05: "What a wonderful device!" Comment 6: Guy on 2019-04-06: "How far away are you?" Comment 7: Jon Kulp on 2019-04-06: ""or" not "of"" Comment 8: Windigo on 2019-04-14: "Library of Congress" Comment 9: Jon Kulp on 2019-04-15: "A great summer job" Comment 10: Jon Kulp on 2019-04-18: "Older near-perfect player pianos" hpr2787 (2019-04-09) "NodeJS Part 1" by operat0r. Comment 1: tuturto on 2019-04-10: "looking for more" hpr2789 (2019-04-11) "Pacing In Storytelling" by lostnbronx. Comment 1: tuturto on 2019-04-11: "what about non-fictional stories" hpr2793 (2019-04-17) "bash coproc: the future (2009) is here" by clacke. Comment 1: Dave Morriss on 2019-04-22: "I really enjoyed this!" hpr2796 (2019-04-22) "IRS,Credit Freezes and Junk Mail Ohh My!" by operat0r. Comment 1: cogoman on 2019-04-25: "Credit card security" hpr2798 (2019-04-24) "Should Podcasters be Pirates ?" by knightwise. Comment 1: tuturto on 2019-04-24: "Yarrr, record me episodes" Comment 2: Dave Morriss on 2019-04-27: "Memories of early podcasts and pirate radio" Comment 3: DudeNamedBen on 2019-04-29: "Da Podfather, Adam Curry" Mailing List discussions Policy decisions surrounding HPR are taken by the community as a whole. This discussion takes place on the Mail List which is open to all HPR listeners and contributors. The discussions are open and available on the HPR server under Mailman. The threaded discussions this month can be found here: Events Calendar With the kind permission of we are linking to The Community Calendar. Quoting the site: This is the community event calendar, where we track events of interest to people using and developing Linux and free software. Clicking on individual events will take you to the appropriate web page. Any other business HPR on Wikipedia Please see the draft at If you are not already a host, then please help improve the site. Tags and Summaries Thanks to the following contributor for sending in updates in the past month: Tony Hughes Over the period tags and/or summaries have been added to 36 shows which were without them. If you would like to contribute to the tag/summary project visit the summary page at and follow the instructions there. View the full article
  29. You want to know what is hidden from you? the process 1. Clone victim whatsapp# 2. All mobile playstore or applestore has clone whatsapp app With all this, we have 100% whatsapp hack Reach me through I C Q(72 409 357 5) (watsapp) +1 815627 6442 Chat me up for more informations
  1. Load more activity