A cheat sheet for common data journalism stuff. For details on installing these tools, see how I work. Use CMD + F to search the page, or the jump menu below if you know what you're looking for. Jump to: Command line tools grep | head/tail | ffmpeg | pdftk | esridump | wget ...
The first one is installing Rust development tools on the Raspberry Pi it self, and the second one is installing on the PC and making cross-compilation to generate a executable that runs on the Raspberry Pi. Developing on the Raspberry Pi and running Rust programs on the Raspberry Pi How to...
If you're running Raspberry Pi without a desktop interface or prefer using the terminal, there are several ways to enable SSH. The sections below cover how to enable SSH with theraspi-configtool, usingsystemctl, or manually. Choose a method that you prefer and follow the steps below. Enable...
Receiving one-time codes by e-mail is rather slow and not very reliable because e-mail accounts often get hijacked. There is a better way: Steam lets you generate one-time codes in the mobile app. First, it’s safer. Second, the code is always generated instantly. Here’s how to set...
This chapter is a guide to the Unix commands and utilities that will be referenced throughout this book. This is preliminary material, and you may already know ...
Enter the user's password. The public key is shared with the remote server, and the user can log in without a password. There is also thessh-agentcommand, which you can use to store private keys used for public key authentication. This is normally useful when a passphrase protects keys....
Here is a quick overview of how to get around a Apex Legends hardware ban: Step 1: Uninstall Apex Legends and clear all traces. Step 2: Change HWID Registry keys. Step 3: Change your IP Address. Step 4: Change your Disk’s Serial Number/ID. Step 5: Change hardware IDs. Step 6: ...
For long-term storage and enhanced security, Trezor stands out as a hardware wallet solution. Unlike software wallets, Trezor stores private keys offline, safeguarding them from potential online threats such as malware and phishing. With this hardware wallet, users need to physically connect the ...
When looping over a Bash array it’s often useful to access the keys of the array separately of the values. This can be done by using the ! (bang) notation. # Print Indexed Array Keys [me@linux ~]$ for keys in "${!myDemoArray[@]}"; do echo "$keys"; done 0 1 2 3 4 # ...
To find out, we need to see what advantages come with playing the game that way. Advantage 1: You can play Pokemon Go without moving. To play the game, use the arrow keys or a joystick to move on the map. Advantage 2: You can quickly cheat in Pokémon games. Using an emulator ...