text
stringlengths 3
1.74M
| label
class label 2
classes | source
stringclasses 3
values |
---|---|---|
Google Implements Confirmation Into Mobile Ads, No More Accidental Taps – Droid Life. | 0non-cybersec
| Reddit |
Easily the best thing I saw today on the NJ Turnpike. | 0non-cybersec
| Reddit |
If ${n \choose 3} + {n+3-1 \choose 3} = (n)_3$, compute $n$.. <p>If ${n \choose 3} + {n+3-1 \choose 3} = (n)_3$, compute $n$.</p>
<p>Just making sure I am on the right track...</p>
<p>Do I expand each piece out and solve algebraically?</p>
| 0non-cybersec
| Stackexchange |
such a lovely person. | 0non-cybersec
| Reddit |
Premium eCover Review - DISCOUNT + HUGE BONUS + OTOs + DEMO. | 0non-cybersec
| Reddit |
Found a group of bugs hibernating together at the foot of an old statue.. | 0non-cybersec
| Reddit |
Repaired MBR from WinXP, now Fedora won't boot. <p>I have a machine on which I installed windows XP and then installed Fedora 18.
Everything worked fine when booted Fedora first time. </p>
<p>But when I booted XP my antivirus software prompted me with a message for corrupted MBR and asked me to repair it.</p>
<p>I pressed <code>yes</code> and when I booted again, it directly boots XP.</p>
<p>Can anybody told how to use the XP bootmgr to display boot menu?<br>
I have installed Fedora on different drive.</p>
| 1cybersec
| Stackexchange |
One more reason to dislike car dealerships. | 0non-cybersec
| Reddit |
$f_n \rightarrow 0$ in $L^1$ $\implies \sqrt{f_n} \rightarrow 0$ also?. <p>Let $(X,\Sigma,\mu)$ be a finite measure space, and let $\{f_n : n \in \mathbb{N} \}$ be a sequence of non-negative measurable functions converging in the $L^1$ sense to the zero function. Show that the sequence $\{\sqrt{f_n}:n \in \mathbb{N} \}$ also converges in the $L^1$ sense to the zero function.</p>
<p>So I have to somehow show that</p>
<p>$$
\lim_{n \to \infty}\int_X\lvert\sqrt{f_n(x)}\rvert\;\mathbb{d}\mu(x) = 0
$$</p>
<p>If I'm honest I don't really know where to start. I think it's an easy question, but I'm new to this stuff. Any help appreciated!</p>
| 0non-cybersec
| Stackexchange |
Disable Flowable/Observable Buffer. <p>I'm having issues getting always the last value from combination obtained with a combineLatest operator.</p>
<p>I have 2 hot flowables (a, b) generating <strong>events at high frequency</strong> (an event every 100ms each):</p>
<pre><code>Flowable<OrderBook> flowA = sourceA.getObservableOrderBook(value);
Flowable<OrderBook> flowB = sourceB.getObservableOrderBook(value);
</code></pre>
<p>combined with a combineLatest, which takes almost 300ms to do it's job.</p>
<pre><code>Flowable<OrderBookCouple> combined = Flowable.combineLatest(flowA, flowB, OrderBookCouple::new).observeOn(Schedulers.newThread());
combined.subscribe((bookCouple) -> {
System.out.println("A timestamp: " + bookCouple.aOrderBook.getTimeStamp());
System.out.println("B timestamp: " + bookCouple.bOrderBook.getTimeStamp());
Thread.sleep(300);
}
</code></pre>
<p>After one execution of the <strong>combiner</strong>, I would like to <strong>process the very last combination</strong> of event generated, meaning (lastA, lastB).</p>
<p>The default behaviour of the combined flow is to cache all combination of events in its own buffer, so that the combined flow is receveing combinations that are very old and this time gap is exploding. </p>
<p>How should I change my code to disable this buffer and receive always the very last combinaton?</p>
| 0non-cybersec
| Stackexchange |
PfSense Vulnerabilities Part 4: Directory Traversal. | 1cybersec
| Reddit |
Bokeh - How to Click and Drag?. <p>I would like to click-and-drag the scatter points the points of a bokeh scatter plot. Any ideas how to do this? </p>
<p>(edit: this is <a href="http://mpld3.github.io/examples/drag_points.html" rel="noreferrer">an example</a> of what I'd like to do)</p>
<p>For an example of a scatter, the code below generates the scatter plot chart found half-way through <a href="http://bokeh.pydata.org/en/latest/docs/user_guide/intro.html" rel="noreferrer">this page</a>.</p>
<pre><code>from bokeh.plotting import figure, output_file, show
# create a Figure object
p = figure(width=300, height=300, tools="pan,reset,save")
# add a Circle renderer to this figure
p.circle([1, 2.5, 3, 2], [2, 3, 1, 1.5], radius=0.3, alpha=0.5)
# specify how to output the plot(s)
output_file("foo.html")
# display the figure
show(p)
</code></pre>
| 0non-cybersec
| Stackexchange |
Most people enjoy a day off on the 4th of July. Except fire. Fire works on the 4th of July. | 0non-cybersec
| Reddit |
Energy functional of smooth map $S^2\to M$. <p>Let $f:S^2\to M$ be a smooth map where $(M,g)$ is a Riemannian manifold. Typically the energy functional of $f$ is written as an integral over $S^2$, so it exists by compactness. However, in <em>Ricci Flow and the Sphere Theorem</em> by Brendle, he identifies $S^2$ with $\Bbb R^2\cup\{\infty\}$ via stereographic projection, then defines
$$\mathscr{E}(f):=\frac{1}{2}\int \left(\left|\frac{\partial f}{\partial x}\right|^2+\left|\frac{\partial f}{\partial y}\right|^2\right)\,\mathrm dx\,\mathrm dy,$$
where $(x,y)$ are the standard coordinates on the plane. In general, this functional seems to diverge, even for quite reasonable functions $S^2\to M$. Does the stereographic projection force the integral to be finite somehow? If it doesn't, do we have to restrict attention to a restricted class of functions to vary this functional and find its critical points? </p>
| 0non-cybersec
| Stackexchange |
The integration of a form on the smooth locus of an analytic subvariety. <p>Let <span class="math-container">$X$</span> be a compact complex manifold, and <span class="math-container">$V$</span> be an irreducible analytic subvariety of <span class="math-container">$X$</span>. Denote <span class="math-container">$V_{reg}$</span> the set of regular points of <span class="math-container">$V$</span>, or the smooth locus of <span class="math-container">$V$</span>, suppose <span class="math-container">$V_{reg}$</span> is of dimension <span class="math-container">$k$</span>, and <span class="math-container">$\alpha$</span> is a smooth real <span class="math-container">$(k,k)$</span> form on <span class="math-container">$X$</span>, then I was told that we can integrate <span class="math-container">$\alpha$</span> with respect to <span class="math-container">$V$</span>.</p>
<p>The logic here is clear. <span class="math-container">$V_{reg}$</span> is well-known to be a complex submanifold, and <span class="math-container">$\alpha$</span> is a top form on <span class="math-container">$V_{reg}$</span>. However, it seems to me that <span class="math-container">$\alpha$</span> is not necessarily compactly supported on <span class="math-container">$V_{reg}$</span>, how is the integration well-defined then?</p>
| 0non-cybersec
| Stackexchange |
Codimension of Effective CD. <p>An effective Cartier Divisor $D$ of a integer Scheme $X$ is associated to a set of tuple $\{(U_i, f_i)\}$ where $U_i$ prove a affine covering of $X$ and $f_i \in \Gamma(U_i, \mathcal{O}_X)$ are the regular local sections. These a defining in invertible ideal sheaf $\rho$ on $X$. Thus I can interpret the Cartier Divisor $D$ as support the quotient ideal $\mathcal{O}_X / \rho$. </p>
<p>My question is why has $D$ codimension $1$?</p>
<p>My ideas: As I know the codimenion of a subscheme is defined by $\operatorname{codim}(D,X) = \inf \{ \dim \mathcal{O}_{D,y} \mid y\in D \}$ (is it the right definition?) </p>
<p>Futhermore, because $D$ arises from $\mathcal{O}_X / \rho$ it's stalks are of the shape $\mathcal{O}_{D, y} =\mathcal{O}_{X, y} / (f)$ for a regular $f$.
Applying Krull's Principle Ideal Theorem I get only the unequality $1 \ge dim(\mathcal{O}_{D,y})$, but how to get the equality?</p>
| 0non-cybersec
| Stackexchange |
My first tattoo for my 21st. Done by Abrahan favela from atomic tattoos.. | 0non-cybersec
| Reddit |
cant make it more than 5days. Hello guys ... i always after some time go try a keto diet because i learned that the body doesnt like sugar and is in no way useful for the body + it feeds the bad bacteria and parasytes and fats + salt is the way to go, so i only make leafy green salads with kelp, nori, chia seeds, flax seed oil, olive oil, avocado and drink around 3l of distilled water +- because i also drink kombucha and water kefir + i make a 1l liquid with 1tsp of spirulina, chlorella, blue green algae ( afa ), 10-15 drops of marine phytoplankton, 1tsp of msm and himalayan salt and and sip on it during the day but then after like 2 days i cant stand the smell and taste of avocado and the oils and cant make myself eat the salad, because it just smells so full, heavy and the taste isnt any good + i eat lots of fruit the night before so i wont crave anything after :D ..... and, well ..... then it changes to a water fast, since i dont know what to eat and sometimes happen that im not at home or just dont have time or whatever and cant prepare the green drink and kombucha + kefir, i would say that the green drink and these probiotics made me feel alot better compared to before, when i tried to go keto and didnt drink any of these ..... but 3+ days are nightmare, i sleep 4 hours and cant lie down anymore, so i go to take a pee but it feels like i forgot how to walk and i have to lean against the wall otherwise i would fall down and barely can make the pee come out :D then i drink a cup of kombucha and a cup of kefir, that makes me feel instantly alot better, but still i feel like i have to lean onto something or just jump on the bed and not move at all and just wait for it do disappear :D...... then i start my computer and look for a keto recipes but everything is avocado, fish, bacon, eggs, cheese ..... and thats no go because im vegan and since i cant find anything and im afraid to eat anything because everything has sugar in it and i dont want to break ketosis, i always make it to be a water fast and then after a max of 5 days i quit it with melon or apples or something :D, its not that i crave something or that i would be hungry, its weird because i feel completely neutral and as good as i never did before, i dont crave anything, no desire for anything, i dont know what is hunger, but the way i feel weak that i cant even walk or lift a cup as my hands are shaking and i can feel and hear my heart beating as if it were plugged directly into my ears and was about to jump out of my chest any second ..... i realy admire people that are xx months or years on keto, its my goal to live a keto lifestyle someday, i always learn something new after i fail my 5 day try and the next one is always better, now the only problem i have is that i dont know what to eat (im vegan) and then i dont eat anything and turns out to be a water fast :D ....i guess it would be alot easier to just eat lots of eggs and dead flesh but thats a no go (eew) .... do you guys feel good ? like can you function normal at your jobs, driving a car and so on ? have a good sleep ? i cant fall asleep and if i do, i wont sleep more than 4 hours | 0non-cybersec
| Reddit |
(Green Screen) PEWDIEPIE IS THE WEI!!. | 0non-cybersec
| Reddit |
Update on policy, transparency and new moderators. ###Update on policies
So there has clearly been a lot of uproar and controversy surrounding the latest mod post, and you don’t need me telling you that. The post made by rederic was one that was not approved or voted on by me or any other moderator - we had quick discussion about it in modmail then rederic went ahead with it. Immediately, I’m sure everyone wants to blame rederic, but I think it is fair to take on some of the blame myself, as I have started a new job recently and am moving city so I have been extremely busy sorting all that out and I let the excess mod duties fall on rederic and the rest of the mod team, without any sort of guidance. I apologise for that to the modteam and, more importantly, the community.
Onto business, I feel it is important to recognise what the community wants, and it is clear what that is. As with everything, however, there needs to be a little compromise on both ends - for example, we will not be retracting the no memes rule, but we will be providing a lot more leniency for posts related to cannabis. It is hard to put into words what the moderators will be looking at when they try and decide whether to remove a post, but here is my best attempt:
**The posts must still be related to cannabis, but this does not mean they must contain cannabis.** Things that are related to stoner culture (such as 4/20, Bob Marley, comics [not rage comics though], art etc.) or things that are related to /r/trees culture (pineapples, ents, etc.). Munchies are also allowed, as long as they do not have any brand names in the title or picture. When it comes down to it, **original content is the key** to all of this, as it is what makes the subreddit so much more interesting, fun and fresh to look at. What we don’t want to see is loosely-related content that has been taken off some blog, but we will be much more lenient and forgiving if it is original content.
To reiterate, the posts must be related to cannabis or cannabis culture, but ~~must not~~ do not have to directly contain cannabis or paraphernalia in the picture - really, they must be relevant to the cannabis/trees community. I feel this creates a good balance between what the community wants and what the modteam feels it can manage. With over 500,000 subscribers, we simply cannot go for a free-for-all system where votes dictate everything, and people who have been on reddit long enough will understand this.
As far as the 18+ rule goes, we will be keeping the rule of no underage users and will be keeping the 18+ setting. We have changed the CSS so that it does not appear that every post is tagged NSFW, and hopefully this will help any confusion. If, however, the community is still overwhelmingly against this then I will change it.
###New moderators
We have finally come to the end of our moderator search. It has taken so long for reasons mentioned above, and I apologise for this too. We received almost *500 applications* though, and we've managed to narrow it down. If you were not selected, don’t feel bad, there was a huge amount of competition and the ones we picked were not just good, but they stood out. So please welcome our new moderators:
* /u/spliffy_mcdank
* /u/hezex
* /u/ianmassey
* /u/Tyzon05
Please note, **more moderators does not mean more moderation!** It simply means more ideas and input, less workload for each mod, and generally a better team to serve you guys. Hopefully they will leave a message here with a little introduction so we can all say hello. Once again, thanks for all of your applications, we had so many good ones to choose from, so don’t feel bad if you didn't make the cut; there is always next time!
###Transparency
A final note on transparency (if anyone has made it this far) and how we as a modteam should be conducting our rule changes and such. Now that we have changed the rules slightly, we hope to be getting feedback at one stage or another and, for future changes, we will consult the community in regards to what we should do. We hope that if the modteam and the community work together we can get what everyone wants without any arguments along the way.
If you have any questions then please leave a comment, [PM me](http://www.reddit.com/message/compose/?to=PenguinKenny) or [message the moderators](http://www.reddit.com/message/compose?to=%2Fr%2Ftrees).
**EDIT:** Just letting you know that I posted this quite late in my timezone and I will be going to sleep soon so if you don't get replies then PM me if it's urgent or wait for another mod if I don't get to it first.
**EDIT:** Edited the very confusing line "but must not contain cannabis..." to what I meant to say, "does not have to contain cannabis..."
***
###**EDIT:** 11th September - I've reverted the 18+ setting back to normal. The subreddit is still for over 18 year olds, but the damn tags are gone now.
A mod post will be made soon fully explaining everything. | 0non-cybersec
| Reddit |
My son and I playing "Greedy Granny" steal her snacks then press the button to see if she wakes up 😂. | 0non-cybersec
| Reddit |
Video library. I have a 64 gig iPhone. I like watching movies on it. IOS 6 currently has no built in way to organize my 1000+ video files into anything other than alphabetical order. No playlists, no "My Top Rated". Nada.
Is there any other way to achieve a folder type breakdown similar to what's in the Music section? | 0non-cybersec
| Reddit |
Ubuntu 17.04 lists two nvidia kernel modules as installed. <p>I'm on Ubuntu 17.04 and <code>dkms status</code> lists the following two nvidia modules:</p>
<pre><code>nvidia-375, 375.66, 4.10.0-19-generic, x86_64: installed
nvidia-375, 375.66, 4.10.0-22-generic, x86_64: installed
</code></pre>
<p>I checked my kernel version, it's:</p>
<pre><code>4.10.0-22-generic
</code></pre>
<p>Am I encouraged to remove the nvidia module for the older kernel version?</p>
<p>Or, are they supposed to live together?</p>
| 0non-cybersec
| Stackexchange |
I'm crossposting this because I thought the fitness folks might have some interest in idea: "would anybody out there be interested in /r/PersonalChallenge?". | 0non-cybersec
| Reddit |
Mac Outlook "Calendar Permissions" is grayed out. <p>I'm trying to share my calendar, but the appropriate things are grayed out. To ungrey them, I'd think I need to set "Calendar Permissions". However, that's grayed out too. </p>
<p>I've seen things that say I need to check "Hide On My Computer folders" but that doesn't seem to do anything. Also, the options I have don't seem to match what the help pages claim. I only have:</p>
<ul>
<li>Show all account folders </li>
<li>Hide One My Computer Folders</li>
</ul>
<p>I don't have "Group Similar Folders".</p>
<p>I'm using Outlook for Mac, 15.37 in OSX 10.12.6
on a macbook pro, in case that matters...</p>
| 0non-cybersec
| Stackexchange |
CIA Secret Experiments - History's Secrets - full documentary [2010]. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
University of Cincinnati Malware Analysis 2020 Course. | 1cybersec
| Reddit |
WIBTA if I expressed the fact that I am uncomfortable with a photo my girlfriend wants to post to Instagram?. My girlfriend is currently on vacation with a female friend of hers, and obviously they are going to be taking lots of pictures. My girlfriend was Skyping me and sent me a picture that she wanted to post and she is in her bathing suit but it looks to be a thong bathing suit where you can pretty much see her entire ass. Would I be the asshole if I told her I was uncomfortable with her posting it as some of my family follows her on Instagram too aswell as my general discomfort? I don’t want to tell her that “she isn’t allowed to post it” just that it makes me uncomfortable. How could I go about expressing my discomfort? | 0non-cybersec
| Reddit |
Radial solution of this PDE. <p>can you guys give me an idea on how to begin solving this problem?</p>
<p>suppose <span class="math-container">$u(x,t)$</span> is smooth and solves</p>
<p><span class="math-container">$u_{tt}(x,t)-4\Delta_{x}u(x,t)=0$</span>, <span class="math-container">$x\in \mathbb{R}^{3}, t>0$</span></p>
<p>compute the radial solutions <span class="math-container">$u(x,t)=v(r,t), r=\sqrt{x_{1}^{2}+x_{1}^{2}+x_{3}^{2}}$</span></p>
<p>Also, is <span class="math-container">$\Delta_{x}$</span> a typo? should it say just <span class="math-container">$\Delta$</span>?</p>
| 0non-cybersec
| Stackexchange |
Apache Commons Net FTPClient and listFiles(). <p>Can anyone explain me what's wrong with the following code? I tried different hosts, FTPClientConfigs, it's properly accessible via firefox/filezilla... The problem is I always get empty filelist without any exceptions (files.length == 0). I use commons-net-2.1.jar installed with Maven.</p>
<pre><code> FTPClientConfig config = new FTPClientConfig(FTPClientConfig.SYST_L8);
FTPClient client = new FTPClient();
client.configure(config);
client.connect("c64.rulez.org");
client.login("anonymous", "anonymous");
client.enterRemotePassiveMode();
FTPFile[] files = client.listFiles();
Assert.assertTrue(files.length > 0);
</code></pre>
| 0non-cybersec
| Stackexchange |
Emacs Regex Capture+Replace: (abc (:key map)) -> (abc (-> map :key str)). <p>I have a bunch of (clojure) code that looks like this:</p>
<pre><code>(content (:some-key some-map))
</code></pre>
<p>I want this code to become:</p>
<pre><code>(content (-> some-map :some-key str))
</code></pre>
<p>I tried:</p>
<pre><code>(content (\(:[-a-z].*\) \([-a-z].*\)))
</code></pre>
<p>For the search part, and:</p>
<pre><code>(content (-> \2 \1 str))
</code></pre>
<p>For the replace part, but it found no matches. Am I doing something wrong?</p>
| 0non-cybersec
| Stackexchange |
psql insert json with double quotes inside strings. <p>I'm trying to insert <code>exiftool</code> generated JSON into postgresql via <code>psql</code> which appears valid. It appears somehow that having the escaped single quote and the escaped double quote are not working properly. I can't figure out how to properly escape the json. It appears that psql isn't handling the single quote escape properly as its booting the \" out to the psql instead of the query.</p>
<p>Given this table</p>
<pre><code>create table test (exif jsonb);
</code></pre>
<p>These work:</p>
<pre><code>test=> insert into test values ('{"a": 1, "b": "2"}');
INSERT 0 1
test=> insert into test values ('{"a": 1, "b": "2\""}');
INSERT 0 1
test=> select * from test;
exif
----------------------
{"a": 1, "b": "2"}
{"a": 1, "b": "2\""}
</code></pre>
<p>But these don't</p>
<pre><code>test=> insert into test values ('{"a": 1, "b": "1\' 2\""}');
Invalid command \""}');. Try \? for help.
test=> select '{"a": 1, "b": "1' 2\""}';
Invalid command \""}';. Try \? for help.
test=> select E'{"a": 1, "b": "1' 2\""}';
Invalid command \""}';. Try \? for help.
test=> select '{"a": 1, "b": "1\' 2\""}';
Invalid command \""}';. Try \? for help.
</code></pre>
<p>Any suggestions?</p>
| 0non-cybersec
| Stackexchange |
How do I increase the length of the snake so it follows the previous rect/length in front of it, instead of being directly behind the head. <p>The way my current program works is that when the snake eats an apple, length gets added to the snake. But the way the length follows the snake is that it is always behind the head in a straight line. How would I make it follow the snake or follow the length in front of it like a normal snake game?</p>
<p>This is my code when I am adding length to the snake.</p>
<pre class="lang-py prettyprint-override"><code>for i in range(lengthAmount):
if i == 0:
previousx = snakex - (30 * i)
previousy = snakey
if direction == "left":
previousx = snakex + (30 * i)
previousy = snakey
elif direction == "right":
previousx = snakex - (30 * i)
previousy = snakey
elif direction == "up":
previousx = snakex
previousy = snakey + (30 * i)
elif direction == "down":
previousx = snakex
previousy = snakey - (30 * i)
pygame.draw.rect(window, (0, 175, 0), (previousx, previousy, 30, 30))
</code></pre>
| 0non-cybersec
| Stackexchange |
Equivalent of \nocite{} for \mcite{} in biblatex?. <p>What is the <code>\mcite{}</code> equivalent for <code>\nocite{}</code> in <code>biblatex</code>?</p>
<h1>Background</h1>
<p>I am trying to reproduce a set of reference in another document using <code>biblatex</code>. The other document uses the equivalent of <code>\mcite{}</code> in several places, concatenating reference. My current solution is to reproduce the reference structure with something like:</p>
<pre><code>\documentclass{article}
\usepackage[backend=biber, bibstyle=numeric, mcite, ]{biblatex}
\addbibresource{tst.bib}
\begin{document}
\mcite{set1, *Ref1:2008, *Ref2:2009} % What is the \nocite{} equivalence?
\nocite{Ref3:2013}
\section*{References}
\printbibliography[heading=none]
\end{document}
</code></pre>
<p>(here is the bibliography file <code>tst.bib</code>)</p>
<pre><code>@Article{Ref1:2008,
author = {Author A},
title = {Title A},
journal = {A Journal},
year = {2008},
}
@Article{Ref2:2009,
author = {Author B},
title = {Title B},
journal = {A Journal},
year = {2009},
}
@Article{Ref3:2013,
author = {Author D},
title = {Title D},
journal = {A Journal},
year = {20013},
}
</code></pre>
<p><img src="https://i.stack.imgur.com/waf6I.png" alt="Sample output"></p>
<p>I can of course hack this so all the citations appear on the first page and then chop that off, but there seems to be an asymmetry and that a <code>\nomcite</code> command should exist.</p>
| 0non-cybersec
| Stackexchange |
Access android internal storage for full passive deep malware scan?. <p>Is it possible to passively (with a computer) view/scan <strong>all</strong> content on an android mobile device's internal storage without crackopen/damaging it? For a deep malware scan of the whole storage of the device?</p>
<hr>
<p>For example: Making a 100% duplicate copy of the internal storage (especially the system path and folders) for examination on a computer?</p>
<p>Consider the user knows all his passwords and PINs and the android filesystem is compromised with malware that would hide itself if tested with an on-device anti-virus application. Thats why I'm asking for <strong>passive</strong> scan technique. Like you can create a 100% duplicate image of your harddrive from computer.</p>
| 1cybersec
| Stackexchange |
Goat Cheese and Herb Risotto. | 0non-cybersec
| Reddit |
How to communicate with two PC using RS232. <p>I was just wondering that is this possible to communicate with two computers using RS232 using softwares like docklight and putty. Suppose if i send Hi from on pc will it recive in another PC and vice versa.</p>
| 0non-cybersec
| Stackexchange |
First trailer of 'Shadow' by Zhang Yimou - Director of Jet Li‘s ’Hero’...and Matt Damon‘s The Great Wall. | 0non-cybersec
| Reddit |
Splitting Field of Irreducible Polynomial over a Finite Field. <p>Suppose $f(x)$ is irreducible over $\mathbb{F}_p[X]$ and let $\alpha$ be a root of $f$ in some extension field.</p>
<p>I want to prove the following claim. I have included thoughts below, but I am <em>very</em> confused as to how this can be shown.</p>
<blockquote>
<p><strong>Claim:</strong> $\mathbb{F}_p(\alpha)$ is a splitting field for $f$ over $\mathbb{F}_p$.</p>
</blockquote>
<p>Now, if we suppose that $\text{deg}(f)=n$, then $\mathbb{F}_p(\alpha)$ contains $p^n$ elements, so $\mathbb{F}(\alpha) \cong \mathbb{F}_{p^n}$. </p>
<p>By consider the Frobenius map $\theta:\alpha \rightarrow \alpha^p$, which is an automorphism, we can show that $\text{Gal}(\mathbb{F}_{p^n} : \mathbb{F}_p) \cong C_n$, the cyclic group of order $n$.</p>
<p>$\text{Gal}(\mathbb{F}_{p^n} : \mathbb{F}_p) \cong C_n$ permutes the roots of $f$ (<strong>Is this true?</strong>) and so all of the roots are of the form $\alpha^t$ for some $t$ and so contained in $\mathbb{F}_{p^n}$. So any splitting field would have to be a subfield of order dividing $p^n$. </p>
<p>But $p$ is prime, so the only other subfields are those of size $p^s$ where $s |n$. (<strong>Why can none of these be splitting fields?</strong>)</p>
| 0non-cybersec
| Stackexchange |
A somewhat amusing interaction: Some toy npcs become attackable in FFA PvP areas. | 0non-cybersec
| Reddit |
El Diablo Mexican Fighting Chicken Soup [a bachelor homage to Ricky Bobby]. Bachelor poor college student here and use the heck out of the crockpot. I make meals that I can freeze and eat and I pinch my pennies trying to make the best meal for my buck... so I came up with this..and it is amazing! By far my favorite thing thus far to cook. BTW it is quite spicy.
* 6 boneless skinless chicken thighs
* Approx 3/4 bottle of store bough Mojo Criollo (amazing)
* 1 white onion chopped fine
* couple table spoons of minced garlic
* 1 small can of chipotle peppers in adobe sauce
* 1/4 cup olive oil (your choice)
* Cut up red new potatoes (as much as you would like)
* about a cup or so of chicken broth (make it more "soupy")
* I add some jalapenos to it and a tomatillo
Sometimes I cook up some quinoa and add it to my bowl of soup if I am feeling up to it.
Put it on low for about 3-4 hours, then high for a 1-2. Check the chicken and potatoes and you're good to go
EDIT: formatting | 0non-cybersec
| Reddit |
Growing up in the age of instant messaging and the false sense of intimacy. Being born in the 90s and being shy meant AIM. It meant myspace. Talking online was so much easier than at school. It was my comfort zone. It meant cultivating entire relationships through the internet. My closest friend I only spoke with through IM-ing and rarely even spoke to at school. I was quiet and would rather type things out than vocalize them. It would fill the social needs I had, but it was wrong.
In college I barely made any friends, but I got a boyfriend online through blogs. You start liking what they post and not how they are in real life. It ended up not working out.
I've grown up a lot since then. I'm fine having conversations with people even though I'm an introvert. But I still need some socialization and I realize I'm using my online crutch again when I'm lonely. Especially now since I lost my closest friend.
I do it most I'm depressed or lonely. I post a lot on Instagram and reddit. I post photos I think are interesting on my stories and people watch. I dont check who sees them or likes them, but just need to express myself since I dont have a lot of people around me who would listen. I dont have that number one person I could talk to and coworkers only fill in so much.
I'm now realizing I rely on that false sense of intimacy. A desperate attempt to feel close to others when they "get" what I posted. I usually dont care if other people listen to the same music I do or like the same movies, but it's nice. I can only enjoy my solitude for so long.
It's like in that movie I dont remember the name of: happiness is only real when shared | 0non-cybersec
| Reddit |
Can't mount Windows partition in Linux - hibernated, refuses to mount. <p>I've disabled all of the secure-boot options (secure boot, legacy boot, fastboot, & even the one in windows which I had to go to power settings & change from hibernation to shutting down).</p>
<p>Here's the error if it'll help:</p>
<pre><code>Error mounting /dev/sda4 at /media/%Username/Windows: Command-line
`mount -t "ntfs" -o "uhelper=udisks2,nodev,nosuid,uid=1000,gid=1000"
"/dev/sda4" "/media/%Username/Windows"' exited with non-zero exit
status 14: Windows is hibernated, refused to mount. Failed to mount
'/dev/sda4': Operation not permitted The NTFS partition is in an
unsafe state. Please resume and shutdown Windows fully (no hibernation
or fast restarting), or mount the volume read-only with the 'ro' mount
option.
</code></pre>
<p>I read online that this is a HP BIOS problem but not one of those posts actually showed how to fix the problem so I though I'd ask myself.</p>
| 0non-cybersec
| Stackexchange |
Ending a procedure early in Maple. <p>I want to jump to the end of the procedure if an IF statement is true</p>
<pre><code>NzdOrInv := proc (a::integer, m::integer)
if (a > m) then
printf("a > m, cannot proceed. Terminating program.") <-- I WANT TO JUMP TO THE END OF THE PROCEDURE HERE
end if
if gcd(a, m) = 1 then
inverseCalc(a, m)
elif gcd(a, m) > 1 then
compZeroDiv(a, m)
end if
end proc
</code></pre>
<p>I've tried inserting a <code>end proc</code> after the line <code>printf("a > m, cannot proceed. Terminating program.")</code> but it doesn't work.</p>
| 0non-cybersec
| Stackexchange |
Corey Struggs (Big Nigga) has passed away from cancer.. | 0non-cybersec
| Reddit |
How to configure VPN per app in iOS 7?. <p>As one of the business feature the upcoming iOS 7, Apple has announced the ability to configure VPN on application basis.
However, details about this feature are hard to find on the web.
I am wondering, if this configuration will be something that can be done on the Device itself, or if it has to be something that has to be set up by an IT administrator in the network?</p>
| 0non-cybersec
| Stackexchange |
Ways of painting $N$ distinct boxes with $N-k$ colours where each colour must be used at least once. <p>There are $N$ distinct boxes, and I'm given $N-k$ colours to paint these boxes but I must use each colour at least once. So in the end, there will be at least one box of every colour. How many ways are there to paint the $N$ boxes?</p>
<p>What I've tried is that if I know the number of repetitions of each colour, then we can write the number of ways to paint it that. </p>
<p>Let $a_i\geq 1$ denote the number of boxes painted with colour $i$ where $1\leq i \leq N-k$.</p>
<p>Then each $\{a_1,a_2,a_3,...,a_{n-k}\}$ corresponds to a configuration of the paintings where $$\sum_{j=1}^{n-k} a_j = N.$$
Let $A$ be the set of all possible sets$\{a_1,a_2,a_3,...,a_{n-k}\}$.</p>
<p>For a fixed $\{a_1,a_2,a_3,...,a_{n-k}\}\in A$, the number of ways is
$$\frac{N!}{\prod_{j=1}^{n-k} a_j!}$$
So the total number of ways is obtained by summing over all configurations, that is,</p>
<p>$$\sum_{a\in A} \frac{N!}{\prod_{j=1}^{N-k} a_j!}$$</p>
<p>Is this the best I can do and can this be simplified to a simpler expression? Is there another way to count this problem?</p>
| 0non-cybersec
| Stackexchange |
Closed form for the recurrence $c_0=-1,\ c_{n+1}=\sqrt{\frac{c_n+1}{2}}.$ that computes $\cos(\pi/2^n)$. <p>Let $c_n:=\cos(\pi/2^n)$ for $n\geq 0$. These values can be computed using the following recurrence (I can explain why if needed): $$c_0=-1,\ c_{n+1}=\sqrt{\frac{c_n+1}{2}}.$$</p>
<p>Is there a closed form for this recurrence? It there is, how can one find it? If there isn't, how can one prove it?</p>
| 0non-cybersec
| Stackexchange |
When referring to a year (2013), its based on the supposed birth of Christ. But it's used worldwide in non Christian countries.. | 0non-cybersec
| Reddit |
Does anyone know how I would make watercress pork soup like this in a slowcooker?. http://farm6.static.flickr.com/5121/5282382272_67fce19966_b.jpg | 0non-cybersec
| Reddit |
Does iTunes play count gets increased while listening with iPod/iPhone/iPad?. <p>If I have a song A with play count of 10, then I play the song once (1 time) on my computer, 3 times on my iPad, and 4 times with my iPhone; would the play count go to 18,next time I sync all my devices?</p>
| 0non-cybersec
| Stackexchange |
Chrome 64 Mobile Android not preload and not autoplay muted videos. <p>We encounter issue with Chrome 64 video element which <strong>not loaded</strong> and <strong>not autoplay</strong> although we used video attributes <code>preload="auto"</code> and <code>muted</code> on HTML element.</p>
<p>the video start load and <strong>paused</strong>, after research, we discovered it never starts to play, like the browser blocked it from playing.</p>
<p>our video doesn't have sound, no sound channel at all, and still no autoplay. </p>
<p>Chrome 63 working great and the same device with 64 stop autoplay.</p>
<p>we did all the things Google Chrome wrote in the release notes, but we think there is another issue we don't know about.</p>
| 0non-cybersec
| Stackexchange |
No real solutions to $\sum_{n\,=\,0}^\infty \frac {(-1)^{n + 1}} {n^x} = 0$. <p>Prove that there are no real numbers $x$ such that</p>
<p>$$\sum_{n\,=\,0}^\infty \frac {(-1)^{n + 1}} {n^x} = 0$$</p>
<p>Can I have a hint please?</p>
| 0non-cybersec
| Stackexchange |
What's a practical example of encryption "in use" or "in process"?. <p>I'm studying for the CCSP and from a high-level, I keep hearing encryption described in three forms: </p>
<ul>
<li>Protecting data <strong>at rest</strong>.</li>
<li>Protecting data <strong>in transit</strong>.</li>
<li>Protecting data <strong>in use</strong>.</li>
</ul>
<p>The first two make sense to me, but then I'm struggling to think of a practical example for the third scenario. Can someone elaborate? Unfortunately, my study material doesn't elaborate.</p>
<p>One scenario I could think of would be (perhaps) masking some sensitive information (like only showing the last four digits of a credit card number to a customer service rep). That might be a stretch though... because technically wouldn't the data still be at rest?</p>
| 0non-cybersec
| Stackexchange |
Be A Bro - Customer Service Managers Scrape Chat Text and Use Keywords in Your Chat To Review The Reps. Don’t Just Say “Thank You”. Add words like “Easy” and “Professional.”. | 0non-cybersec
| Reddit |
UPDATE TWO: Plastic Beach (3/4ths done) (Read comments for updates). | 0non-cybersec
| Reddit |
First batch of $35 Linux computers arrives in UK, awaiting CE compliance testing. | 0non-cybersec
| Reddit |
Deciding on my final course to take in grad school, seeking advice.. I am pursuing a career in applied ecology. If I had to get specific, I'd say I'd like my work to be related to water quality, but I'm not set on that. I had planned on working for the EPA or the Army Corps of Engineers, but I don't think they'll be hiring much when I graduate in spring 2018. I don't want to be in academia so I'm not 100% sure on what my options are, but I'm thinking either consulting or some sort of involvement with research/assessment.
What are some good courses to take at this point? I only have space for one more class. Some options I'm considering now:
* Fundamentals of GIS: I have no experience in GIS and I know it's a good skill to have, I'm just not sure how relevant it would be for my goals. Also, is it possible to learn online for free? If so is that a valid substitute?
* Environmental Site Assessment: "Study of ASTM guidelines for environmental site assessment, emphasis on historic overview, regulations, and preparation methods." I don't really know much about this, but it seems relevant
* Aquatic & Wetland Plant Taxonomy: relevant to my thesis (I guess), and maybe relevant to work? Not sure how much an employer would value a taxonomy class. It seems like they'd rather see a skill-based course.
Which of those seems like the best option? Or is there another course that may be more useful upon graduation? | 0non-cybersec
| Reddit |
Who had the worst off field attitude but was a great player?. | 0non-cybersec
| Reddit |
Question about the monotone convergence theorem. <p>If every bounded monotonic sequence is convergent, does that mean that mean that every non-bounded non-monotonic sequence is divergent? Or can non-bounded non-monotonic sequences be convergent?</p>
| 0non-cybersec
| Stackexchange |
Critical Role separates from Geek and Sundry. [https://icv2.com/articles/news/view/40677/critical-role-goes-solo](https://icv2.com/articles/news/view/40677/critical-role-goes-solo)
Someone posted recently about Geek and Sundry and if they were still relevant. ([https://www.reddit.com/r/boardgames/comments/8r9p2m/is\_geek\_and\_sundry\_relevant/](https://www.reddit.com/r/boardgames/comments/8r9p2m/is_geek_and_sundry_relevant/)) A lot of the comments mentioned that Critical Role is what is keeping this alive. I wonder what they will depend on now, or if they are still viable? | 0non-cybersec
| Reddit |
why git-svn failed with signal 13?. <p>it is confusing that i failed for many times to clone a svn repo using git svn, why?</p>
<pre><code>$ git svn clone -s https://192.168.2.145/svn/myprojects/Search/
Following parent with do_switch
Successfully followed parent
r362 = 6be745be496f98f96ac66fccead8211734cf6455 (refs/remotes/tags/8-22)
Found possible branch point: https://192.168.2.145/svn/myprojects/demo/trunk => https://192.168.2.145/svn/myprojects/Search/trunk, 368
Initializing parent: refs/remotes/trunk@368
**error: git-svn died of signal 13**
$ echo $?
141
</code></pre>
| 0non-cybersec
| Stackexchange |
Is my proof that $ B- \bigcup_{i=i}A_i \subseteq \bigcap_{i=I}(B - A_i)$ correct?. <p>Suppose $x$ is arbitrary . Let $$ x \in B- \bigcup_{i=i}A_i$$</p>
<p>Then $$ x \in B \land x \notin \bigcup_{i=i}A_i$$</p>
<p>So $$ x \in B \land \forall i \in I \rightarrow x \notin A_i $$</p>
<p>Thus,</p>
<p>$$ x \in \bigcap_{i=I}(B - A_i)$$</p>
<p>Since $x$ is arbitrary, </p>
<p>$$B- \bigcup_{i=i}A_i \subseteq \bigcap_{i=I}(B - A_i)$$</p>
<p>I'm not really sure about my conclusion since $ x \in \bigcap_{i=I}(B - A_i)$ seems to be equivalent to $ \forall i \in I \rightarrow x \notin A_i \land x \in B $ and not the third line of my proof. Or are they equivalent?</p>
| 0non-cybersec
| Stackexchange |
first time on mushrooms. | 0non-cybersec
| Reddit |
Mysql join query for multiple "tags" (many-to-many relationship) that matches ALL tags?. <p>I am trying to query for Objects that match ALL of a given set of Tags. </p>
<p>Basically I want users to be able to add on more and more Tags to filter or "narrow down" their search results, kind of like newegg.com does.</p>
<p>My table structure is a table of Objects, a table of Tags, and a MANY:MANY relation table ObjectsTags. So I have a JOIN query like so:</p>
<pre><code>SELECT * FROM Objects
LEFT OUTER JOIN ObjectsTags ON (Objects.id=ObjectsTags.object_id)
LEFT OUTER JOIN Tags ON (Tags.id=ObjectsTags.tag_id)
</code></pre>
<p>I tried using an IN clause/condition, like this:</p>
<pre><code>SELECT * FROM Objects
LEFT OUTER JOIN ObjectsTags ON (Objects.id=ObjectsTags.object_id)
LEFT OUTER JOIN Tags ON (Tags.id=ObjectsTags.tag_id)
WHERE Tags.name IN ('tag1','tag2')
GROUP BY Objects.id
</code></pre>
<p>But I learned that this simulates a series of ORs, so the more tags you add to the query the MORE results you get, instead of the result set narrowing down like I was hoping.</p>
<p>I also tried doing multiple LIKE WHERE conditions, ANDed together:</p>
<pre><code>SELECT * FROM Objects
LEFT OUTER JOIN ObjectsTags ON (Objects.id=ObjectsTags.object_id)
LEFT OUTER JOIN Tags ON (Tags.id=ObjectsTags.tag_id)
WHERE Tags.name LIKE 'tag1'
AND Tags.name LIKE 'tag2'
GROUP BY Objects.id
</code></pre>
<p>But this returns no results, since when the results are grouped together the OUTER JOINed Tags.name column just contains 'tag1', and not also 'tag2'. The result row where 'tag2' matched is "hidden" by the GROUPing.</p>
<p>How can I match ALL of the tags to get the "narrow down" or "drill down" effect that I am after? Thanks.</p>
| 0non-cybersec
| Stackexchange |
Can't connect to host by hostname. <p>I have a problem which can be described by these four lines</p>
<pre><code>$ host example.com
example.com has address 10.10.10.10
$ ping example.com
ping: unknown host example.com
</code></pre>
<p>As I see, hostname resolves fine, but the "ping" command seems to ignore it.
And google searches don't give me anything because this is too specific and I'm not totally sure, how to describe it right. Thanks.</p>
| 0non-cybersec
| Stackexchange |
Official Pokemon App (iOS/Android) coming this summer.. | 0non-cybersec
| Reddit |
Preview line and half-page scrolling. <p>While two-finger scrolling in Preview is nice, it is not very comfortable when slowly reading very long PDFs.</p>
<p>What I've figured out to this point is that I can use <kbd>space</kbd> and <kbd>⇧</kbd>+<kbd>space</kbd> to move forward and back a page at a time; and <kbd>↓</kbd> and <kbd>↑</kbd> arrows to move a couple pixels down.</p>
<p>Is there any way I can set the arrows to move down a line at a time? (Note that with zoomed in document for reading, it takes 3-4 key presses to move down a line)</p>
<p>Or, any way I can set <kbd>space</kbd> to move down only half a page?</p>
<p>Maybe there are some other tips for comfortably reading/scrolling long documents?</p>
| 0non-cybersec
| Stackexchange |
A part of the Leontief matrix: something -> something. <p>I know this is probably not needed considering I have a matrix and such, but I would like to know what the best way would be for formatting something like this into LaTeX: </p>
<p><img src="https://i.stack.imgur.com/aTLK9.jpg" alt="Element -> Element (or Sector -> Sector in the case of Leontief matrices)"></p>
<p>Tried using matrices and tables but nothing that looks like this.</p>
| 0non-cybersec
| Stackexchange |
Elliptic approximation of a $L^2$ function. <p>Let $\Omega$ an open and bounded set of $\mathbb{R}^N$.
Consider $f\in L^2(\Omega)$, and $\varepsilon >0$. Let us call $u_\varepsilon$ the unique weak solution in $H^1_0(\Omega)$ of the problem</p>
<p>$-\varepsilon \Delta u + u = f \; \mbox{ in } \Omega,\;\; u=0 \;\; \mbox{ on }\partial \Omega.$</p>
<p>Prove that $u_\varepsilon$ converges to $f$ in $L^2(\Omega)$, as $\varepsilon$ goes to $0$.</p>
<p>Can you help me with to prove this result?</p>
<p>So far, I have this estimates: </p>
<p>$\|\nabla u_\varepsilon\|_{L^2(\Omega)}\leq \|f\|_{L^2(\Omega)}\varepsilon^{-1}$ and </p>
<p>$\|u_\varepsilon\|_{L^2(\Omega)}\leq \|f\|_{L^2(\Omega)}$.</p>
| 0non-cybersec
| Stackexchange |
Postfix logging "Fatal: no SASL authentication mechanisms". <p>I was trying to close the open relay postfix server I had running, as there was spam coming from it, and now I can't get e-mails. The message I get in the log when someone tries to send an email is <code>Fatal: no SASL authentication mechanisms</code></p>
<p>This is my main.cf:</p>
<pre><code># See /usr/share/postfix/main.cf.dist for a commented, more complete version
# Debian specific: Specifying a file name will cause the first
# line of that file to be used as the name. The Debian default
# is /etc/mailname.
#myorigin = /etc/mailname
smtpd_banner = $myhostname ESMTP $mail_name (Ubuntu)
biff = no
# appending .domain is the MUA's job.
append_dot_mydomain = no
# Uncomment the next line to generate "delayed mail" warnings
#delay_warning_time = 4h
readme_directory = no
# TLS parameters
#smtpd_tls_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.pem
#smtpd_tls_key_file=/etc/ssl/private/ssl-cert-snakeoil.key
#smtpd_use_tls=yes
#smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
#smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
smtpd_tls_cert_file=/etc/ssl/certs/dovecot.pem
smtpd_tls_key_file=/etc/ssl/private/dovecot.pem
smtpd_use_tls=no
smtpd_tls_auth_only = no
smtpd_sasl_type = dovecot
smtpd_sasl_path = private/auth
smtpd_sasl_auth_enable = yes
smtpd_sasl_security_options = noanonymous noplaintext
smtpd_client_restrictions = permit_mynetworks,
reject_rbl_client zen.spamhaus.org,
reject_rbl_client cbl.abuseat.org, reject_rbl_client bl.spamcop.net,
reject_rbl_client list.dsbl.org, reject_rbl_client dnsbl.njabl.org,
reject_rbl_client dnsbl.sorbs.net, permit
# See /usr/share/doc/postfix/TLS_README.gz in the postfix-doc package for
# information on enabling SSL in the smtp client.
myhostname = cheesemail.us
alias_maps = hash:/etc/aliases
alias_database = hash:/etc/aliases
myorigin = /etc/mailname
#mydestination = example.com, hostname.example.com, localhost.example.com
mydestination = localhost
relayhost =
mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128
mailbox_size_limit = 0
recipient_delimiter = +
inet_interfaces = all
smtp_bind_address=162.248.92.245
## Tells Postfix to use Dovecot's LMTP instead of its own LDA to save emails to the local mailboxes.
virtual_transport = lmtp:unix:private/dovecot-lmtp
## Tells Postfix you're using MySQL to store virtual domains, and gives the paths to the database connections.
virtual_mailbox_domains = mysql:/etc/postfix/mysql-virtual-mailbox-domains.cf
virtual_mailbox_maps = mysql:/etc/postfix/mysql-virtual-mailbox-maps.cf
virtual_alias_maps = mysql:/etc/postfix/mysql-virtual-alias-maps.cf
</code></pre>
<p>And this is my master.cf:</p>
<pre><code>#
# Postfix master process configuration file. For details on the format
# of the file, see the master(5) manual page (command: "man 5 master").
#
# Do not forget to execute "postfix reload" after editing this file.
#
# ==========================================================================
# service type private unpriv chroot wakeup maxproc command + args
# (yes) (yes) (yes) (never) (100)
# ==========================================================================
smtp inet n - - - - smtpd
smtps inet n - n - - smtpd
-o smtpd_tls_wrappermode=yes
#-o smtpd_sasl_security_options=noanonymous
#smtp inet n - - - 1 postscreen
#smtpd pass - - - - - smtpd
#dnsblog unix - - - - 0 dnsblog
#tlsproxy unix - - - - 0 tlsproxy
submission inet n - - - - smtpd
-o syslog_name=postfix/submission
-o smtpd_tls_security_level=none
#-o smtpd_sasl_auth_enable=yes
-o smtpd_client_restrictions=permit_mynetworks
-o milter_macro_daemon_name=ORIGINATING
#smtps inet n - - - - smtpd
# -o syslog_name=postfix/smtps
# -o smtpd_tls_wrappermode=yes
# -o smtpd_sasl_auth_enable=yes
# -o smtpd_client_restrictions=permit_sasl_authenticated,reject
# -o milter_macro_daemon_name=ORIGINATING
#628 inet n - - - - qmqpd
pickup fifo n - - 60 1 pickup
cleanup unix n - - - 0 cleanup
qmgr fifo n - n 300 1 qmgr
#qmgr fifo n - n 300 1 oqmgr
tlsmgr unix - - - 1000? 1 tlsmgr
rewrite unix - - - - - trivial-rewrite
bounce unix - - - - 0 bounce
defer unix - - - - 0 bounce
trace unix - - - - 0 bounce
verify unix - - - - 1 verify
flush unix n - - 1000? 0 flush
proxymap unix - - n - - proxymap
proxywrite unix - - n - 1 proxymap
smtp unix - - - - - smtp
relay unix - - - - - smtp
# -o smtp_helo_timeout=5 -o smtp_connect_timeout=5
showq unix n - - - - showq
error unix - - - - - error
retry unix - - - - - error
discard unix - - - - - discard
local unix - n n - - local
virtual unix - n n - - virtual
lmtp unix - - - - - lmtp
anvil unix - - - - 1 anvil
scache unix - - - - 1 scache
#
# ====================================================================
# Interfaces to non-Postfix software. Be sure to examine the manual
# pages of the non-Postfix software to find out what options it wants.
#
# Many of the following services use the Postfix pipe(8) delivery
# agent. See the pipe(8) man page for information about ${recipient}
# and other message envelope options.
# ====================================================================
#
# maildrop. See the Postfix MAILDROP_README file for details.
# Also specify in main.cf: maildrop_destination_recipient_limit=1
#
maildrop unix - n n - - pipe
flags=DRhu user=vmail argv=/usr/bin/maildrop -d ${recipient}
#
# ====================================================================
#
# Recent Cyrus versions can use the existing "lmtp" master.cf entry.
#
# Specify in cyrus.conf:
# lmtp cmd="lmtpd -a" listen="localhost:lmtp" proto=tcp4
#
# Specify in main.cf one or more of the following:
# mailbox_transport = lmtp:inet:localhost
# virtual_transport = lmtp:inet:localhost
#
# ====================================================================
#
# Cyrus 2.1.5 (Amos Gouaux)
# Also specify in main.cf: cyrus_destination_recipient_limit=1
#
#cyrus unix - n n - - pipe
# user=cyrus argv=/cyrus/bin/deliver -e -r ${sender} -m ${extension} ${user}
#
# ====================================================================
# Old example of delivery via Cyrus.
#
#old-cyrus unix - n n - - pipe
# flags=R user=cyrus argv=/cyrus/bin/deliver -e -m ${extension} ${user}
#
# ====================================================================
#
# See the Postfix UUCP_README file for configuration details.
#
uucp unix - n n - - pipe
flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient)
#
# Other external delivery methods.
#
ifmail unix - n n - - pipe
flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient)
bsmtp unix - n n - - pipe
flags=Fq. user=bsmtp argv=/usr/lib/bsmtp/bsmtp -t$nexthop -f$sender $recipient
scalemail-backend unix - n n - 2 pipe
flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension}
mailman unix - n n - - pipe
flags=FR user=list argv=/usr/lib/mailman/bin/postfix-to-mailman.py
${nexthop} ${user}
</code></pre>
<p>And I'm not sure if dovecot matters, but I'll post the configs that I have edited from that too.</p>
<p>10-master.conf:</p>
<pre><code>#default_process_limit = 100
#default_client_limit = 1000
# Default VSZ (virtual memory size) limit for service processes. This is mainly
# intended to catch and kill processes that leak memory before they eat up
# everything.
#default_vsz_limit = 256M
# Login user is internally used by login processes. This is the most untrusted
# user in Dovecot system. It shouldn't have access to anything at all.
#default_login_user = dovenull
# Internal user is used by unprivileged processes. It should be separate from
# login user, so that login processes can't disturb other processes.
#default_internal_user = dovecot
service imap-login {
inet_listener imap {
port = 0
}
inet_listener imaps {
#port = 993
#ssl = yes
}
}
service pop3-login {
inet_listener pop3 {
#port = 110
}
inet_listener pop3s {
#port = 995
#ssl = yes
}
}
service lmtp {
unix_listener /var/spool/postfix/private/dovecot-lmtp {
mode = 0600
user = postfix
group = postfix
}
# Create inet listener only if you can't use the above UNIX socket
#inet_listener lmtp {
# Avoid making LMTP visible for the entire internet
#address =
#port =
#}
}
service imap {
# Most of the memory goes to mmap()ing files. You may need to increase this
# limit if you have huge mailboxes.
#vsz_limit = 256M
# Max. number of IMAP processes (connections)
#process_limit = 1024
}
service pop3 {
# Max. number of POP3 processes (connections)
#process_limit = 1024
}
service auth {
# auth_socket_path points to this userdb socket by default. It's typically
# used by dovecot-lda, doveadm, possibly imap process, etc. Its default
# permissions make it readable only by root, but you may need to relax these
# permissions. Users that have access to this socket are able to get a list
# of all usernames and get results of everyone's userdb lookups.
unix_listener /var/spool/postfix/private/auth {
mode = 0666
user = postfix
group = postfix
}
unix_listener auth-userdb {
mode = 0600
user = vmail
#group =
}
# Postfix smtp-auth
#unix_listener /var/spool/postfix/private/auth {
# mode = 0666
#}
# Auth process is run as this user.
user = dovecot
}
service auth-worker {
# Auth worker process is run as root by default, so that it can access
# /etc/shadow. If this isn't necessary, the user should be changed to
# $default_internal_user.
user = vmail
}
service dict {
# If dict proxy is used, mail processes should have access to its socket.
# For example: mode=0660, group=vmail and global mail_access_groups=vmail
unix_listener dict {
#mode = 0600
#user =
#group =
}
}
</code></pre>
<p>I have a feeling that it has to do with <code>service auth {...}</code>, because it's talking about authentication in the logs. </p>
<p>If I need to add any more configs, just let me know. I'm out of ideas here.</p>
<p>10-auth:</p>
<pre><code>##
## Authentication processes
##
# Disable LOGIN command and all other plaintext authentications unless
# SSL/TLS is used (LOGINDISABLED capability). Note that if the remote IP
# matches the local IP (ie. you're connecting from the same computer), the
# connection is considered secure and plaintext authentication is allowed.
disable_plaintext_auth = yes
# Authentication cache size (e.g. 10M). 0 means it's disabled. Note that
# bsdauth, PAM and vpopmail require cache_key to be set for caching to be used.
#auth_cache_size = 0
# Time to live for cached data. After TTL expires the cached record is no
# longer used, *except* if the main database lookup returns internal failure.
# We also try to handle password changes automatically: If user's previous
# authentication was successful, but this one wasn't, the cache isn't used.
# For now this works only with plaintext authentication.
#auth_cache_ttl = 1 hour
# TTL for negative hits (user not found, password mismatch).
# 0 disables caching them completely.
#auth_cache_negative_ttl = 1 hour
# Space separated list of realms for SASL authentication mechanisms that need
# them. You can leave it empty if you don't want to support multiple realms.
# Many clients simply use the first one listed here, so keep the default realm
# first.
#auth_realms =
# Default realm/domain to use if none was specified. This is used for both
# SASL realms and appending @domain to username in plaintext logins.
#auth_default_realm =
# List of allowed characters in username. If the user-given username contains
# a character not listed in here, the login automatically fails. This is just
# an extra check to make sure user can't exploit any potential quote escaping
# vulnerabilities with SQL/LDAP databases. If you want to allow all characters,
# set this value to empty.
#auth_username_chars = abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890.-_@
# Username character translations before it's looked up from databases. The
# value contains series of from -> to characters. For example "#@/@" means
# that '#' and '/' characters are translated to '@'.
#auth_username_translation =
# Username formatting before it's looked up from databases. You can use
# the standard variables here, eg. %Lu would lowercase the username, %n would
# drop away the domain if it was given, or "%n-AT-%d" would change the '@' into
# "-AT-". This translation is done after auth_username_translation changes.
#auth_username_format =
# If you want to allow master users to log in by specifying the master
# username within the normal username string (ie. not using SASL mechanism's
# support for it), you can specify the separator character here. The format
# is then <username><separator><master username>. UW-IMAP uses "*" as the
# separator, so that could be a good choice.
#auth_master_user_separator =
# Username to use for users logging in with ANONYMOUS SASL mechanism
#auth_anonymous_username = anonymous
# Maximum number of dovecot-auth worker processes. They're used to execute
# blocking passdb and userdb queries (eg. MySQL and PAM). They're
# automatically created and destroyed as needed.
#auth_worker_max_count = 30
# Host name to use in GSSAPI principal names. The default is to use the
# name returned by gethostname(). Use "$ALL" (with quotes) to allow all keytab
# entries.
#auth_gssapi_hostname =
# Kerberos keytab to use for the GSSAPI mechanism. Will use the system
# default (usually /etc/krb5.keytab) if not specified. You may need to change
# the auth service to run as root to be able to read this file.
#auth_krb5_keytab =
# Do NTLM and GSS-SPNEGO authentication using Samba's winbind daemon and
# ntlm_auth helper. <doc/wiki/Authentication/Mechanisms/Winbind.txt>
#auth_use_winbind = no
# Path for Samba's ntlm_auth helper binary.
#auth_winbind_helper_path = /usr/bin/ntlm_auth
# Time to delay before replying to failed authentications.
#auth_failure_delay = 2 secs
# Require a valid SSL client certificate or the authentication fails.
#auth_ssl_require_client_cert = no
# Take the username from client's SSL certificate, using
# X509_NAME_get_text_by_NID() which returns the subject's DN's
# CommonName.
#auth_ssl_username_from_cert = no
# Space separated list of wanted authentication mechanisms:
# plain login digest-md5 cram-md5 ntlm rpa apop anonymous gssapi otp skey
# gss-spnego
# NOTE: See also disable_plaintext_auth setting.
auth_mechanisms = plain login
##
## Password and user databases
##
#
# Password database is used to verify user's password (and nothing more).
# You can have multiple passdbs and userdbs. This is useful if you want to
# allow both system users (/etc/passwd) and virtual users to login without
# duplicating the system users into virtual database.
#
# <doc/wiki/PasswordDatabase.txt>
#
# User database specifies where mails are located and what user/group IDs
# own them. For single-UID configuration use "static" userdb.
#
# <doc/wiki/UserDatabase.txt>
#!include auth-deny.conf.ext
#!include auth-master.conf.ext
#!include auth-system.conf.ext
!include auth-sql.conf.ext
#!include auth-ldap.conf.ext
#!include auth-passwdfile.conf.ext
#!include auth-checkpassword.conf.ext
#!include auth-vpopmail.conf.ext
#!include auth-static.conf.ext
</code></pre>
<p>The mechanisms set in here are plan and login.</p>
<p>Log snippet</p>
<pre><code>Jan 28 07:53:27 chicago1 dovecot: director: Fatal: Invalid value for director_mail_servers setting
Jan 28 07:53:27 chicago1 dovecot: lmtp(27036): Connect from local
Jan 28 07:53:27 chicago1 dovecot: lmtp(27036): Disconnect from local: Connection closed (in banner)
Jan 28 07:53:27 chicago1 dovecot: lmtp(27050): Connect from local
Jan 28 07:53:27 chicago1 dovecot: lmtp(27050): Disconnect from local: Connection closed (in banner)
Jan 28 07:53:27 chicago1 dovecot: doveadm: Error: doveadm client disconnected before handshake: EOF
Jan 28 07:53:28 chicago1 dovecot: imap-urlauth-login: Error: auth: connect(tokenlogin) failed: Connection refused
Jan 28 07:53:29 chicago1 dovecot: imap-urlauth-login: Error: auth: connect(tokenlogin) failed: Connection refused
Jan 28 07:53:29 chicago1 dovecot: imap-urlauth-login: Disconnected (disconnected before auth was ready, waited 1 secs): user=<>, secured, session=<12Kp27UNAAAAAAAA>
Jan 28 07:54:17 chicago1 postfix/smtpd[27102]: connect from unknown[unknown]
Jan 28 07:54:17 chicago1 postfix/smtpd[27102]: fatal: no SASL authentication mechanisms
Jan 28 07:54:17 chicago1 postfix/smtpd[27103]: connect from localhost[::1]
Jan 28 07:54:17 chicago1 postfix/smtpd[27103]: fatal: no SASL authentication mechanisms
Jan 28 07:54:18 chicago1 postfix/master[26883]: warning: process /usr/lib/postfix/smtpd pid 27102 exit status 1
Jan 28 07:54:18 chicago1 postfix/master[26883]: warning: /usr/lib/postfix/smtpd: bad command startup -- throttling
Jan 28 07:54:18 chicago1 postfix/master[26883]: warning: process /usr/lib/postfix/smtpd pid 27103 exit status 1
Jan 28 07:54:26 chicago1 dovecot: imap-login: Error: auth: connect(login) failed: Connection refused
Jan 28 07:54:27 chicago1 dovecot: imap-login: Error: auth: connect(login) failed: Connection refused
Jan 28 07:54:27 chicago1 dovecot: imap-login: Error: connect(ssl-params) failed: Connection refused
Jan 28 07:54:37 chicago1 dovecot: imap-login: Warning: Auth process not responding, delayed sending initial response (greeting): user=<>, rip=72.5.195.249, lip=72.5.195.249, TLS, session=<qHPB37UNhQBIBcP5>
</code></pre>
| 0non-cybersec
| Stackexchange |
best way to start learning socket programming in objective c. <p>i am a beginner in <code>objective c</code> and <code>iphone</code> and i have undertaken a project of 'client </p>
<p>server program' . but i m not having any idea about <code>sockets</code> in iphone . can anyone plz
suggest me some books or links from where i can easily understand the <code>sockets</code> and their </p>
<p>programming in objective c. i recently studied <a href="http://developer.apple.com/library/ios/#samplecode/WiTap/Listings/AppController_m.html" rel="noreferrer">this tutorial</a> but didn't find it helpful</p>
<p>thanks.</p>
| 0non-cybersec
| Stackexchange |
Remove Getfileso.com pop-up - How To Remove PC Malwares. | 1cybersec
| Reddit |
TIL most Japanese schools don't have janitors. Instead children do the cleaning daily as part of a practice rooted in Buddhist traditions that associate cleaning with morality.. | 0non-cybersec
| Reddit |
Jökulsárlón Glacier Lagoon, Iceland [OC][2048x1152]. | 0non-cybersec
| Reddit |
Alec Baldwin: Good-bye, Public Life. Alec Baldwin laments his A-list life. | 0non-cybersec
| Reddit |
Here's who I wake up to every morning. | 0non-cybersec
| Reddit |
Because I'm Batman!. | 0non-cybersec
| Reddit |
WAYWT - January 13. WAYWT = What Are You Wearing Today (or a different day, whatever). Think of this as your chance to share your personal taste in fashion with the community. Most users enjoy knowing where you bought your pieces, so please consider including those in your post. Want to know how to take better WAYWT pictures? Read the guide [here](http://www.reddit.com/r/malefashionadvice/comments/16rwft/how_to_take_better_self_pics_for_mfa/).
If you're looking for feedback on an outfit instead of just looking to share, consider using Outfit Feedback & Fit Check thread instead.
**Important: Downvotes are strongly discouraged in this thread. Sorting by new is strongly encouraged.**
| 0non-cybersec
| Reddit |
The method setLocalDispatchPeriod(int) from the type GAServiceManager is deprecated. <p>I have latest Google analytics SDK for android and seems like <code>setLocalDispatchPeriod(int)</code> has been deprecated. What is the fix for this ?</p>
<p>There is no where in the internet I could find alternate method for this. And most funniest thing is, google has used this method in their own tutorial of <a href="https://developers.google.com/analytics/devguides/collection/android/v3/advanced#example" rel="noreferrer">how to get started.</a></p>
<p>Now does does anybody knows any alternate method ?</p>
| 0non-cybersec
| Stackexchange |
Programming a chess engine in C - Tutorial with over 95 videos.. | 0non-cybersec
| Reddit |
what vpn do you use?. I do not know much about vpns.
i looking for one that doesnt slow down my internet browsing.
one that is safe/ erases all data?
Why Did you pick the vpn that you are using now?
Edit: Thanks everyone for the responses. i was stuck between PIA and Nord. but ended up going with nordvpn. they had a sweet 2 year promo | 0non-cybersec
| Reddit |
Permanently disabling Driver Signing Check. <p>I require to use some unsigned drivers on a Windows 7 x64 system.</p>
<p>I Googled around and found a post which says to use <code>bcdedit</code> and switch test mode on and then to disable integrity check. But it did not work :(</p>
<p>So now, to use those drivers I need to press <kbd>F8</kbd> each time I boot and then Select "Disable Driver Signing Enforcement".</p>
<p>So, is there any way to stop the check? </p>
| 0non-cybersec
| Stackexchange |
[Trotter] Obj says Bill Belichick tells him the same thing in pregame each time they play: “I hope you enjoy today, because there’s not going to be much for you.”. | 0non-cybersec
| Reddit |
Students of the University of Maryland have flown a human-powered helicopter for over a minute at 20 feet off the ground.. | 0non-cybersec
| Reddit |
[WP] Whenever you feel a phantom sensation (pain, itch, etc.), it's because it's happening to your soulmate. One day, you feel something you've never felt before.. | 0non-cybersec
| Reddit |
Guy sees baby hanging from a high rise balcony and he goes full beast mode and scales the building balcony by balcony with total disregard for his own safety. He was in France illegally as an immigrant but after this he was given instant citizenship by the PM of France and a job as a firefighter. | 0non-cybersec
| Reddit |
How to Please Shani Dev and Shine Your Luck. | 0non-cybersec
| Reddit |
Teenagers diary: Let's know some weird fact about this world | Strange !!. | 0non-cybersec
| Reddit |
How can I view a Twitter hashtag live stream?. <p>We have a computer in the office dedicated to news updates. We would like to add a Twitter stream to it.</p>
<p>Unfortunately, if we try to look at a Twitter hashtag stream (<a href="https://twitter.com/hashtag/bitcoin?f=realtime" rel="nofollow noreferrer">https://twitter.com/hashtag/bitcoin?f=realtime</a>) instead of it just showing the new results in real time, it shows a button you can click that says (x amount of new results).</p>
<p>How can I get Twitter to not prompt me to click a button every time new items come into the feed?</p>
| 0non-cybersec
| Stackexchange |
bibtex: single author book with introduction by different author. <p>I've got a single-author, single-piece book (i.e., not a collection of chapters articles, or stories) which has an introduction by a separate author. I'm trying to cite the introduction.</p>
<p><code>@incollection</code> isn't right, because you can't give the collection as a whole a single author, only an <code>editor</code>; <code>@inbook</code> isn't right, because you can't give two different authors, one for the piece and one for the book. Is <code>@misc</code> my only option?</p>
<p>Here's what I've got (which doesn't work: the <code>bookauthor</code> field doesn't display when I compile):</p>
<pre><code>@incollection{jones,
author={Gwyneth Jones},
title={Introduction},
bookauthor={Joanna Russ},
booktitle={The Female Man},
publisher={Gollancz},
series={SF Masterworks},
year={2010},
pages={ix--xii},
}
</code></pre>
| 0non-cybersec
| Stackexchange |
Use package cleveref in Chapters. <pre><code>\documentclass[a4paper,12pt]{report}
%------------------------------------------------------------
\usepackage{amssymb,amsmath,amsthm,latexsym,mathrsfs,amsfonts,dsfont}
%-----accent
\usepackage[utf8]{inputenc}
\usepackage[T1]{fontenc}
\usepackage{xcolor}
\usepackage[colorlinks=true,pagebackref=true]{hyperref}
\hypersetup{urlcolor=blue, citecolor=red, linkcolor=blue}
\newtheorem{corollary}{Corollary}[section]
\usepackage[capitalise,noabbrev,nameinlink]{cleveref}
\begin{document}
\chapter{Preliminary}
....The crucial idea of the proof is to make use ..... (see \cref{fekete} in \cref{app}).
\chapter*{Appendix}\label{app}
\begin{corollary}\label{fekete}
\end{corollary}
\end{document}
</code></pre>
<p>I want to obtain</p>
<p><a href="https://i.stack.imgur.com/OjelZ.jpg" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/OjelZ.jpg" alt="enter image description here"></a></p>
| 0non-cybersec
| Stackexchange |
YSK Swastika is not just a Nazi symbol. The swastika (as a character 卐 or 卍) is an ancient religious icon. It is a symbol of divinity and spirituality in Indian religions.
It was a symbol of auspiciousness and good luck until the 1930s, when it became a feature of Nazi symbolism.
The name swastika comes from Sanskrit meaning "conducive to well being or auspicious".
In Hinduism, the clockwise symbol is called swastika, symbolizing Sun, prosperity and good luck, while the counterclockwise symbol is called sauvastika, symbolizing night or aspects of Goddess Kali.
In Buddhism it symbolizes the auspicious footprints of the Buddha.
The swastika was adopted by several organizations in pre–World War I Europe and later, and most notably, by the Nazi Party and Nazi Germany prior to World War II.
It was used by the Nazi Party to symbolize German nationalistic pride. To Jews and the enemies of Nazi Germany, it became a symbol of antisemitism and terror.
In many Western countries, the swastika is viewed as a symbol of racial supremacy and intimidation because of its association with Nazism.
The reverence for the swastika symbol in Asian cultures, in contrast to the stigma in the West, has led to misinterpretations and misunderstandings | 0non-cybersec
| Reddit |
What does "Static factories returned object need not exist" mean?. <p>While reading "Effective Java" J.Bloch came across this statement </p>
<blockquote>
<p>A fifth advantage of static factories is that the class of the returned object need not exist when the class containing the method is written.</p>
</blockquote>
<p>What does it mean? Can someone explain it with some examples ?</p>
| 0non-cybersec
| Stackexchange |
Ancient Soma Tree - Peter Eglington. | 0non-cybersec
| Reddit |
Eslint error: Missing parentheses around multilines JSX react/jsx-wrap-multilines. <p>I am using Material UI checkbox in my project. I used it the same way it's used in Material UI example: <a href="https://material-ui.com/components/checkboxes/" rel="nofollow noreferrer">https://material-ui.com/components/checkboxes/</a>
but eslint shows me this error:</p>
<p><strong>error Missing parentheses around multilines JSX react/jsx-wrap-multilines</strong></p>
<pre><code><FormControlLabel
control={
<Checkbox
checked={data.default}
value="default"
onChange={(e) => {
return setData({ ...data, default: e.target.checked });
}}
/>
}
label="Make default"
/>
</code></pre>
<p>error is on the line 2 (control={....)</p>
| 0non-cybersec
| Stackexchange |
Computing the integral of a differential form in $\mathbb{R}^{2}$.. <p>Let $D$ be the disk
\begin{equation}
D=\{(x,y)\in\mathbb{R}^{2}\:|\:x^{2}+y^{2}\leq 1\},
\end{equation}
which is easily verified to be a compact $2$-differentiable manifold with boundary.</p>
<p>Let $d\omega$ be the $2$-differential form on $D$ given by
\begin{equation}
d\omega=(1-x^{2})\:dx\wedge dy.
\end{equation}</p>
<p>I want to compute the following integral
\begin{equation}
\int_{D}d\omega
\end{equation}</p>
<p>How can I do that? I don't really understand how to parametrize $D$ in order to keep the standard orientation of $\mathbb{R}^{2}$, which is given by the canonical basis ordered as $[e_{1},\:e_{2}]$. </p>
<p>Can someone help me? Thanks.</p>
| 0non-cybersec
| Stackexchange |
Can any meromorphic function be represented as a product of zeroes and poles?. <p>Given any meromorphic function, can it be represented as</p>
<p>$$c\prod_i (z-z_i)^{n_i} $$</p>
<p>where $ n_i\in\mathbb Z$ and $n_i> 0$ denotes the multiplicity of the zero $ z_i $ and $ n_i <0$ for the poles?</p>
| 0non-cybersec
| Stackexchange |
How to save the print output into a Excel Table. <p>I have a script that Analyze Tag from a PLC
and read a bunch of tags A LOT OF THEM
and i would like to know how can I save the print output into a excel file but with table format</p>
<p>this is part of the script</p>
<pre><code>with PLC() as comm:
comm.IPAddress = '192.168.100.5'
comm.ProcessorSlot = 0
ret = comm.GetPLCTime()
print("Fecha y Hora de Registro Revision Fallas", ret.Value)
time.sleep(1)
Estacion = "D2M017"
#ACTUADOR 1
ACTUADOR = comm.Read('D2M_017.Status.Act._1.WBypassed')
ret = comm.GetPLCTime()
Numero_Act_EnBypass = 0
if ACTUADOR.Value == True:
Sensor = "ACTUADOR 1 WORK SENSOR EN BY PASS"
Numero_Act_EnBypass = (Numero_Act_EnBypass +1)
print(Estacion, ret.Value, "D2M017 =",Sensor)
else:
Sensor = "ACTUADOR 1 WORK OK"
ACTUADOR = comm.Read('D2M_017.Status.Act._1.HBypassed')
ret = comm.GetPLCTime()
if ACTUADOR.Value == True:
Sensor = "ACTUADOR 1 HOME SENSOR EN BY PASS"
Numero_Act_EnBypass = (Numero_Act_EnBypass +1)
print(Estacion, ret.Value, "D2M017 =",Sensor)
else:
Sensor = "ACTUADOR 1 HOME OK"
</code></pre>
<p>this part is repeated 64 more times
and at the end i have this result </p>
<p><a href="https://i.stack.imgur.com/WlgRw.png" rel="nofollow noreferrer">Result of Program</a></p>
<p>and I need to save that info into a Table in excel
splited in parts
Estacion, Date, Status</p>
| 0non-cybersec
| Stackexchange |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.