Some computer viruses can get really bad 😷 . . . #comics #puns #punstagram #punintended #programmingmemes #programmerhumor #programmerdadjokes #programmerjokes #programminglife #coder #comicstrip #comicsofinstagram #computers #commandline #computervirus #infosec #doctormemes #softwaredeveloper #softwareengineer https://www.instagram.com/p/CeJczpFuGYr/?igshid=NGJjMDIxMWI=
6 notes
·
View notes
Useful commands for your Mac
A living post about commandline tools for your Mac.
Episode 1: Set your hostname on zsh.
#apple #terminal #cli #zsh
Terminal is one of my favorite applications in the Mac and I’ve been getting familiar with zsh. This post is a living post where I will keep updating what I learn on the commandline.
Update hostname
What’s the hostname? The word that shows up right after your username if you open “Terminal.”
mac OS used to update the hostname when you update the Computer Name:
Settings > General > About
Or…
View On WordPress
0 notes
What Kind of Tools Should I Use as a Beginner Software Developer
What Kind of Tools Should I Use as a Beginner Software Developer. Embarking on the journey as a novice in the realm of software development opens up a world filled with both excitement and challenges. The vast array of development tools available can be both thrilling and overwhelming, as each tool serves a unique purpose in the multifaceted process of building software. The significance of selecting the right set of tools cannot be overstated, as it plays a pivotal role in shaping your development experience. These tools are not mere accessories but powerful instruments that directly impact your productivity, facilitate seamless collaboration with others, and contribute to the overall quality of your code.
Read Full Content Here 👇👇
What Kind of Tools Should I Use as a Beginner Software Developer
0 notes
Subdominator: Open-source tool for detecting subdomain takeovers - Help Net Security
Subdominator is a dependable and fast open-source command-line interface tool to identify subdomain takeovers. It boasts superior accuracy and reliability, offering improvements compared to other tools.
“Initially, Subdominator was created internally because all the current subdomain takeover tools had gaps in their functionality. No tool had a complete set of accurate service fingerprints or…
View On WordPress
0 notes
"git sweep" Alias - Delete All Local Branches Linked To Deleted Remote Branches With Just One Command!
I used to waste so much time deleting local and remote branches I was done with.
Now I just delete my remote branches (e.g. on GitHub) then run this command:
git sweep
and just like that, my local branches that track remote branches are automatically deleted!
Now let's go over how you can add this command...
What is "git sweep"?
"git sweep" is a git alias I created that is a shortcut that does the following:
Runs the "git fetch --prune" command to delete all references to remote branches.
Find local branches linked to deleted remote branches (these are marked as "gone") then deletes them.
Setting the alias
You can set it using the "git config" command or by editIng the git config file directly.
Here's the command to set the alias with the "git config" command:
git config --global alias.sweep "! git fetch -p && git for-each-ref --format '%(refname:short) %(upstream:track)' | awk '\$2 == \"[gone]\" {print \$1}' | xargs -r git branch -D"
Here's an example of what the config file should look like with the alias added:
[alias]
sweep = ! "git fetch -p && git for-each-ref --format '%(refname:short) %(upstream:track)' | awk '$2 == \"[gone]\" {print $1}' | xargs -r git branch -D"
Conclusion
Check out Erik Schierboom's article on this to learn more about how all of this works in detail.
If you found this post useful in anyway, please like, repost and/or share it.
Thanks for reading!
0 notes
Trying to use ghostscript a cli tool to extract the text layer from a pdf (of a dead frenchman memoir) because I generally trust Google's OCR
ghostscript works fine, extraction works-
uh
this is art
help
this is google ocr's fault tbh
13 notes
·
View notes
Linux Version of Qilin Ransomware Focuses on VMware ESXi
The Linux encryptor includes extensive command-line options for customization, allowing threat actors to specify exclusion and encryption criteria, as well as configure virtual machines that should not be encrypted.
View On WordPress
0 notes