keskiviikko 9. joulukuuta 2020

New MIDI sequencer - 1BitDragon

Hey guys,

Just discovered this. Looks a little toy-ish but at least they made a Linux version, which is very commendable in my book :-)

https://1bitdragon.com/

I could see this as an easy entry for people who want to get into making music. Depending on the export it allows (stems, MIDI), I could even see a more serious use for this for some people.

What do you think ?

Edit : Forgot the link.

submitted by /u/Eamonn-Tobin to r/linuxaudio
[link] [comments]

lauantai 5. joulukuuta 2020

New ISA sound card for Retro PC gamers

New ISA sound card for Retro PC gamers submitted by /u/RobZilla10001 to r/retrobattlestations
[link] [comments]

Here is something which can make your Web life 10X Private.

Did you know that no matter What extensions you install & how Fingerprint resisting, you make your browser to be. There is still no escape for Fingerprinting.

Just visit - https://deviceinfo.me & you will horrified to see every single thing about your Browser. (See mouse movement & keypress section)

So, what's the only way to make sure you don't get Fingerprinted?

Well, it's little inconvenient, but it gives astonishing results. That is -

  1. Disable JavaScript in your browser by default. With uBlock origin or NoScript.
  2. And only enable on sites, you have account or are tools like - Online file upload, temp mail services, Image converters, etc.
  3. Keep it disabled on Article sites. Which articles you visit is the real thing which you should keep private.

From my past 6 months experience, 95% of those article sites, Github (no account), Forums (no account), work just fine without JS.

BUT What about site which don't work without JS?

Here is something which will help you in that 5% times.

Use services like archive.is to take a screenshot of that web article (which doens't load without JS). Thae screenshot is just image, which contains that web page completely without popus or any thing. Try out yourself with imgur.com .

Even more convenient, use a Recommend & Open Source Firefox extension, which make it even easier with support of lots of screenshot services.

https://addons.mozilla.org/en-US/firefox/addon/view-page-archive/

---------

Only after disabling JS, you shall have real privacy. Every other work-round is just lie & deception.

-------- PERSONAL SETUP

  1. I personally use Firefox with Arkenfox user.js & some custom rules. 2. And with extension called - Forget me not, which automatically deletes cookies & stuff after leaving websites. (you can just use Firefox's default clean features)
  2. I also use uBlock origin on Hard Mode with 3rd part block by default & enable connections to the site as I visit them. 4. And adding a VPN on top of it hides your IP too.

Most people here do these things of cookies & ublock, but disabling JS is the most important part.

submitted by /u/SamLovesNotion to r/privacytoolsIO
[link] [comments]

keskiviikko 18. marraskuuta 2020

Neural network cars racing game, hope you like it!

submitted by /u/Affectionate-Frame-6 to r/programming
[link] [comments]

vendor-reset - new project to help AMD users vfio reset woes!

If you had not noticed, there is a new channel #vendor-reset in VFIO Discord, this is the official channel for the new project https://github.com/gnif/vendor-reset which is a collaboration between u/belfrypossum and myself.

This project aims to provide an avenue for easily adding complex reset sequences to the kernel without needing to upstream them into the kernel itself. The reason for making this a module is due to the fact that the complexity of these reset routines would prevent them from ever being accepted upstream by the kernel maintainers. While at this time this project only covers AMD's problematic GPUs, it is a framework designed to cover any problematic hardware should it be needed in the future.

Today both u/belfrypossum and I have agreed that the project is ready for use by the general public and would like to announce that it completely succeeds the prior released patches for AMD GPU resets. Currently the project targets (note this is not an exhaustive list and only a few example GPUs for each ASIC are listed here):

* Polaris 10, 11 & 12
* Vega 10 (Vega56/64/FE)
* Vega 20 (Radeon 7)
* Navi 10 (5600XT, 5700, 5700XT)
* Navi 12 (Pro 5600M)
* Navi 14 (Pro 5300, RX 5300, 5500XT)

Usage is very simple, just build the module and modprobe it, or use `dmks` to manage it directly (configuration is included). Nothing more is needed.

There are still conditions under which the GPUs will not reset however we are working to improve them as time permits.

Again, this removes the need to patch your kernel, and it is required that any patches you have applied for GPU resets be removed when using this module.

submitted by /u/gnif2 to r/VFIO
[link] [comments]

perjantai 8. toukokuuta 2020

Floating Point Visually Explained

submitted by /u/joesilver70 to r/programming
[link] [comments]

Introducing Inkscape 1.0

submitted by /u/dayanruben to r/programming
[link] [comments]

My KVM solution

I just wanted to share my GPU pass-through setup. I'm using NixOS and I followed this guide, line by line, to get my GPU working inside the VM. But I still wasn't happy. As I was tight on budget I bought a 15€ quadro from 1932 for the host and I passed my radeon 580 to the VM, since I want to game on it, but every time I needed to do some relatively graphics intensive work I had to hop on a Linux VM, so I could use the radeon.

Soo... I started looking for a way to run the VM and the host with the same graphics card. I was ready for the solution to be a bit hacky, but I legitimately couldn't find a workable solution for me. I was messing around with the the config.nix file (nixos's settings for most of the system) and the VM settings inside virt-manager and, at some point, I had the VM on auto-boot, and no DE enabled, and voilá, to my surprise, once I shut down the VM, after the auto boot, I am greeted by a TTY session, running on the same card as the vm was.

After more experimenting I realized that everything works fine, with only one card, as long as I stop the display manager before starting the VM (via virsh since virt-manager is a no go by then).

So I put together these scripts:

start_vm:

#!/bin/sh sudo systemctl stop display-manager.service && sleep 1 ; (sudo virsh start "$1" --console ; sudo systemctl start display-manager.service) 

start:

#!/bin/sh tmp=$(sudo virsh list --all | grep " $1 ") output=" - $1 shut off" if [ "$tmp" != "$output" ]; then echo "'$1' is not bootable. Either it doesn't exist or is not shut off." exit 1 fi; sudo daemonize /home/[my_user]/Desktop/start_vm "$1" 

They start a vm (./start Windows10, for example), stopping the display-manager just before actually starting it. And once the VM exits it starts the display-manager again. I added that little verification just so I don't stop and start the display manager every time I misspell a VM's name xd.

This said, is still one issue. The command systemctl stop is not synchronous, as such I need to sleep 1 before actually starting the vm, this usually works fine, but if there is any error while shutting down the display manager or, more importantly, I have too many windows open and the display manager takes longer to stop, the 1 sec sleepage won't bee enough. I could just be conservative and set it to 5 or smthn, but I can't be bothered to wait 5 secs every time xd.

I'd like to hear your guys' thoughts on this.

It was a fun ride and I hope this helps someone in the future!

PS: I know my shell scripts skills are terrible (this was actually my 2nd time using sh in a script). There is probably a better way to make that verification and there is also probably a way to not have 2 scripts, but I just couldn't figure out how xd.

EDIT!!!!!! : I completely overlooked the fact that I didn't, in the end, follow the guide line by line. I ended up not blacklisting the kernel modules respective to the drivers nor loading the vfio drivers on boot. I just let libvirt or qemu, I don't rly know, change the drivers on the fly. When I boot up the VM it loads the virtio drivers, when I shut it down it loads the amdgpu drivers again.

submitted by /u/Zizico2 to r/linux
[link] [comments]

torstai 7. toukokuuta 2020

How to start DOS game programming?

Hello guys, I am new to programming, I know the very basics of C, C++, Java, Python but nothing substantial to make a full fledged game. But I am willing to put a lot of work for this project. I just want to know what all utilities and languages were used to make DOS games. I've been searching a lot about DOS programming, but I couldn't find anything in detail or useful enough for me. It would be really cool if someone can also give documentation about the tools! Thanks!

submitted by /u/MRrock_the_c00L to r/dosgaming
[link] [comments]

sunnuntai 12. huhtikuuta 2020

IPTables GeoFilter + banned_hosts using ipset

I have over the course of a couple of weeks come up with a good geofiler script that will also cycle in IP addresses that snoop your interfaces for know services and add them to an ipset drop list.

I start off in my firewall script with creating new ipset kernel lists so that when my firewall script is run the tables are created in the kernel so that rules can be set using them.

ipset -N china hash:net ipset -N india hash:net ipset -N iran hash:net ipset -N russia hash:net ipset -N korea hash:net ipset -N banned_hosts iphash 

Then I create the iptables statements to incorporate the ipset kernel lists.

iptables -A INPUT -m set --match-set china src -j DROP iptables -A INPUT -m set --match-set india src -j DROP iptables -A INPUT -m set --match-set iran src -j DROP iptables -A INPUT -m set --match-set russia src -j DROP iptables -A INPUT -m set --match-set korea src -j DROP 

Then I create a rule set to add snoopers to the banned_hosts ipset kernel list. I have offset my ssh service to an obscure port number, and It should be noted that I do NOT run an SMTP, WEB or SECURE WEB server on this host. So any IP looking for such services is considered a snooper and has no business talking to my external interface.

iptables -A INPUT -i $UNTRUSTED -p tcp --dport 22 -j SET --add-set banned_hosts src iptables -A INPUT -i $UNTRUSTED -p tcp --dport 25 -j SET --add-set banned_hosts src iptables -A INPUT -i $UNTRUSTED -p tcp --dport 80 -j SET --add-set banned_hosts src iptables -A INPUT -i $UNTRUSTED -p tcp --dport 443 -j SET --add-set banned_hosts src iptables -A INPUT -m set --match-set banned_hosts src -j DROP 

I have put together a script that refreshes the ipset kernel lists and writes out the banned_hosts for permanent inclusion to the banned_hosts kernel list. I call this script /home/fw/geofilter.sh.

# Export the banned_hosts list to a file. ipset list banned_hosts -file /home/fw/banned_hosts.exam # Strip the first 8 lines of exported banned_hosts. sed -e '1,8d' banned_hosts.exam >banned_hosts.log # Flush the ipset lists ipset -F # remove any old list that might exist from previous runs of this script rm *-aggregated.zone # Pull the latest IP set for geofilter wget https://www.ipdeny.com/ipblocks/data/aggregated/cn-aggregated.zone wget https://www.ipdeny.com/ipblocks/data/aggregated/in-aggregated.zone wget https://www.ipdeny.com/ipblocks/data/aggregated/ir-aggregated.zone wget https://www.ipdeny.com/ipblocks/data/aggregated/kp-aggregated.zone wget https://www.ipdeny.com/ipblocks/data/aggregated/kr-aggregated.zone wget https://www.ipdeny.com/ipblocks/data/aggregated/ru-aggregated.zone # Add each IP address from the downloaded list into the ipset for i in $(cat cn-aggregated.zone ); do ipset -A china $i; done for i in $(cat in-aggregated.zone ); do ipset -A india $i; done for i in $(cat ir-aggregated.zone ); do ipset -A iran $i; done for i in $(cat ru-aggregated.zone ); do ipset -A russia $i; done for i in $(cat k*-aggregated.zone ); do ipset -A korea $i; done for h in $(cat banned_hosts.log ); do ipset -A banned_hosts $h; done # Restore iptables /home/fw/firewall.sh 

Call the geofilter.sh from a crontab.

00 4 * * * cd /home/fw/ && sudo ./geofilter.sh >/dev/null 

Create a tmux session (alternative to screen) to watch the traffic counters in iptables. /home/fw/watchfirewall.sh

tmux new -d -s watch "sudo watch -d -n 2 iptables -nvL" 

run the watchfirewall.sh script.

fw@host:/home/fw# ./watchfirewall.sh 

Attach to the tmux session to watch the firewall chain incrementation.

tmux attach -t watch 
submitted by /u/morggin to r/linux
[link] [comments]