• 0 Posts
  • 29 Comments
Joined 2 years ago
cake
Cake day: July 4th, 2023

help-circle
  • I wrote a little script a while back that would save a temp file with fswebcam, run zbarimg on it to decode the qr, delete the temp file and if it worked it would pipe the output into xclip/wl-copy, otherwise it would try again (up to 8 times).

    I hooked it up to a keyboard shortcut and I’ll see the webcam light flash one or two times when I hit it, then know it’s good.

    It wouldn’t be a ton of work to also have a popup with the qr value using zenity or something, maybe use the --question and pass it “copy $output to clipboard?”. You could have an --error if all the scan attempts failed.

    Feel free to shoot me a pm if you want help.




  • I ran ps2 Linux as my “desktop” for 6 months or so back in the day. It wasn’t capable of much compared to a general purpose computer at the time. Videos only played at almost full speed if you ran em in fbdev from a vterm with nothing else running. There was so little ram that using kde1 would run you into slow motion computing because of all the swapping. Window maker was ok, but running much of anything inside it would eat through that 32 megs of ram pretty quickly (I spent most of my time in vterms).


  • You could rent a VPS in a neutral country and use ssh to create a SOCKS proxy to it, then use foxyproxy to add the proxy to firefox/librewolf/whatever and either allowlist certain sites you don’t want your country knowing about or denylist websites you don’t care if your country knows about (especially higher bandwidth sites that aren’t controversial like YouTube).

    At that point you’d have plenty of “real” traffic from the unproxied websites and any traffic the rest of your OS is using, and when you access the proxied sites you want to hide it’ll look like you’re using ssh and/or scp.

    You could also create a proxy server with a tor connection on the server and use ssh port forwarding to access it locally. The Mullvad browser + foxyproxy would probably be your best bet for using that since it’s basically tor browser without tor.

    EDIT: Additionally, if you wanted to proxy an application that doesn’t support SOCKS internally, you can configure proxychains with the proxy and then launch proxychains applicationname.


  • There’s a lot to like about the pine time, and it’s really cool that you can adjust things and recompile. The reason it ultimately didn’t work for me was because the vibration motor isn’t strong enough for me to notice if I’m actively doing something. Your mileage may vary, but it’s worth keeping in mind.

    The original pebble and garmin watches have all been great in that respect.





  • I was pretty lucky in university as most of my profs were either using cross platform stuff or Linux exclusive software. I had a single class that wanted me using windows stuff and I just dropped that one.

    Awesome that you’re getting back into it, it’s definitely the best it’s ever been (and you’re right that Steam cracked the code). It sounds like you probably know what you’re doing if you’re running Linux VMs and stuff, but feel free to shoot me a PM if you run into any questions or issues I might be able to point you in the right direction for.




  • Earlier today I googled how to toggle full screen in dosbox-x and the AI-generated answer said to use alt+enter. Tried it and it didn’t work, so I look in the documentation and it turns out that they changed it to F12+f a while ago (probably to avoid interfering with actual dos input).

    This is definitely already a problem.







  • To add to this, if the phantom clicks are indeed primarily happening while typing or otherwise moving your hands near the touchpad, you should check to see if tap to click is enabled. The unintentional clicks that feature produces drives me crazy and I have no idea why it’s always on by default when a physical click or button is always available.