submitted by /u/VortexAcherontic to r/opensourcegames [link] [comments] |
maanantai 28. joulukuuta 2020
Quake Mod: Quake 1.5 using the free and open source Darkplaces Engine. Powered by openSUSE Tumbleweed
keskiviikko 16. joulukuuta 2020
sunnuntai 13. joulukuuta 2020
perjantai 11. joulukuuta 2020
keskiviikko 9. joulukuuta 2020
New MIDI sequencer - 1BitDragon
Hey guys,
Just discovered this. Looks a little toy-ish but at least they made a Linux version, which is very commendable in my book :-)
I could see this as an easy entry for people who want to get into making music. Depending on the export it allows (stems, MIDI), I could even see a more serious use for this for some people.
What do you think ?
Edit : Forgot the link.
[link] [comments]
lauantai 5. joulukuuta 2020
Here is something which can make your Web life 10X Private.
Did you know that no matter What extensions you install & how Fingerprint resisting, you make your browser to be. There is still no escape for Fingerprinting.
Just visit - https://deviceinfo.me & you will horrified to see every single thing about your Browser. (See mouse movement & keypress section)
So, what's the only way to make sure you don't get Fingerprinted?
Well, it's little inconvenient, but it gives astonishing results. That is -
- Disable JavaScript in your browser by default. With uBlock origin or NoScript.
- And only enable on sites, you have account or are tools like - Online file upload, temp mail services, Image converters, etc.
- Keep it disabled on Article sites. Which articles you visit is the real thing which you should keep private.
From my past 6 months experience, 95% of those article sites, Github (no account), Forums (no account), work just fine without JS.
BUT What about site which don't work without JS?
Here is something which will help you in that 5% times.
Use services like archive.is to take a screenshot of that web article (which doens't load without JS). Thae screenshot is just image, which contains that web page completely without popus or any thing. Try out yourself with imgur.com .
Even more convenient, use a Recommend & Open Source Firefox extension, which make it even easier with support of lots of screenshot services.
https://addons.mozilla.org/en-US/firefox/addon/view-page-archive/
---------
Only after disabling JS, you shall have real privacy. Every other work-round is just lie & deception.
-------- PERSONAL SETUP
- I personally use Firefox with Arkenfox user.js & some custom rules. 2. And with extension called - Forget me not, which automatically deletes cookies & stuff after leaving websites. (you can just use Firefox's default clean features)
- I also use uBlock origin on Hard Mode with 3rd part block by default & enable connections to the site as I visit them. 4. And adding a VPN on top of it hides your IP too.
Most people here do these things of cookies & ublock, but disabling JS is the most important part.
[link] [comments]
maanantai 30. marraskuuta 2020
perjantai 20. marraskuuta 2020
keskiviikko 18. marraskuuta 2020
vendor-reset - new project to help AMD users vfio reset woes!
If you had not noticed, there is a new channel #vendor-reset in VFIO Discord, this is the official channel for the new project https://github.com/gnif/vendor-reset which is a collaboration between u/belfrypossum and myself.
This project aims to provide an avenue for easily adding complex reset sequences to the kernel without needing to upstream them into the kernel itself. The reason for making this a module is due to the fact that the complexity of these reset routines would prevent them from ever being accepted upstream by the kernel maintainers. While at this time this project only covers AMD's problematic GPUs, it is a framework designed to cover any problematic hardware should it be needed in the future.
Today both u/belfrypossum and I have agreed that the project is ready for use by the general public and would like to announce that it completely succeeds the prior released patches for AMD GPU resets. Currently the project targets (note this is not an exhaustive list and only a few example GPUs for each ASIC are listed here):
* Polaris 10, 11 & 12
* Vega 10 (Vega56/64/FE)
* Vega 20 (Radeon 7)
* Navi 10 (5600XT, 5700, 5700XT)
* Navi 12 (Pro 5600M)
* Navi 14 (Pro 5300, RX 5300, 5500XT)
Usage is very simple, just build the module and modprobe it, or use `dmks` to manage it directly (configuration is included). Nothing more is needed.
There are still conditions under which the GPUs will not reset however we are working to improve them as time permits.
Again, this removes the need to patch your kernel, and it is required that any patches you have applied for GPU resets be removed when using this module.
[link] [comments]
maanantai 16. marraskuuta 2020
torstai 12. marraskuuta 2020
maanantai 2. marraskuuta 2020
perjantai 9. lokakuuta 2020
maanantai 5. lokakuuta 2020
lauantai 26. syyskuuta 2020
torstai 10. syyskuuta 2020
tiistai 8. syyskuuta 2020
perjantai 21. elokuuta 2020
sunnuntai 16. elokuuta 2020
lauantai 8. elokuuta 2020
perjantai 31. heinäkuuta 2020
lauantai 25. heinäkuuta 2020
lauantai 20. kesäkuuta 2020
sunnuntai 7. kesäkuuta 2020
perjantai 5. kesäkuuta 2020
sunnuntai 31. toukokuuta 2020
lauantai 16. toukokuuta 2020
perjantai 15. toukokuuta 2020
perjantai 8. toukokuuta 2020
My KVM solution
I just wanted to share my GPU pass-through setup. I'm using NixOS and I followed this guide, line by line, to get my GPU working inside the VM. But I still wasn't happy. As I was tight on budget I bought a 15€ quadro from 1932 for the host and I passed my radeon 580 to the VM, since I want to game on it, but every time I needed to do some relatively graphics intensive work I had to hop on a Linux VM, so I could use the radeon.
Soo... I started looking for a way to run the VM and the host with the same graphics card. I was ready for the solution to be a bit hacky, but I legitimately couldn't find a workable solution for me. I was messing around with the the config.nix file (nixos's settings for most of the system) and the VM settings inside virt-manager and, at some point, I had the VM on auto-boot, and no DE enabled, and voilá, to my surprise, once I shut down the VM, after the auto boot, I am greeted by a TTY session, running on the same card as the vm was.
After more experimenting I realized that everything works fine, with only one card, as long as I stop the display manager before starting the VM (via virsh since virt-manager is a no go by then).
So I put together these scripts:
#!/bin/sh sudo systemctl stop display-manager.service && sleep 1 ; (sudo virsh start "$1" --console ; sudo systemctl start display-manager.service)
#!/bin/sh tmp=$(sudo virsh list --all | grep " $1 ") output=" - $1 shut off" if [ "$tmp" != "$output" ]; then echo "'$1' is not bootable. Either it doesn't exist or is not shut off." exit 1 fi; sudo daemonize /home/[my_user]/Desktop/start_vm "$1"
They start a vm (./start Windows10, for example), stopping the display-manager just before actually starting it. And once the VM exits it starts the display-manager again. I added that little verification just so I don't stop and start the display manager every time I misspell a VM's name xd.
This said, is still one issue. The command systemctl stop
is not synchronous, as such I need to sleep 1
before actually starting the vm, this usually works fine, but if there is any error while shutting down the display manager or, more importantly, I have too many windows open and the display manager takes longer to stop, the 1 sec sleepage won't bee enough. I could just be conservative and set it to 5 or smthn, but I can't be bothered to wait 5 secs every time xd.
I'd like to hear your guys' thoughts on this.
It was a fun ride and I hope this helps someone in the future!
PS: I know my shell scripts skills are terrible (this was actually my 2nd time using sh in a script). There is probably a better way to make that verification and there is also probably a way to not have 2 scripts, but I just couldn't figure out how xd.
EDIT!!!!!! : I completely overlooked the fact that I didn't, in the end, follow the guide line by line. I ended up not blacklisting the kernel modules respective to the drivers nor loading the vfio drivers on boot. I just let libvirt or qemu, I don't rly know, change the drivers on the fly. When I boot up the VM it loads the virtio drivers, when I shut it down it loads the amdgpu drivers again.
[link] [comments]
torstai 7. toukokuuta 2020
How to start DOS game programming?
Hello guys, I am new to programming, I know the very basics of C, C++, Java, Python but nothing substantial to make a full fledged game. But I am willing to put a lot of work for this project. I just want to know what all utilities and languages were used to make DOS games. I've been searching a lot about DOS programming, but I couldn't find anything in detail or useful enough for me. It would be really cool if someone can also give documentation about the tools! Thanks!
[link] [comments]
perjantai 1. toukokuuta 2020
perjantai 17. huhtikuuta 2020
tiistai 14. huhtikuuta 2020
sunnuntai 12. huhtikuuta 2020
IPTables GeoFilter + banned_hosts using ipset
I have over the course of a couple of weeks come up with a good geofiler script that will also cycle in IP addresses that snoop your interfaces for know services and add them to an ipset drop list.
I start off in my firewall script with creating new ipset kernel lists so that when my firewall script is run the tables are created in the kernel so that rules can be set using them.
ipset -N china hash:net ipset -N india hash:net ipset -N iran hash:net ipset -N russia hash:net ipset -N korea hash:net ipset -N banned_hosts iphash
Then I create the iptables statements to incorporate the ipset kernel lists.
iptables -A INPUT -m set --match-set china src -j DROP iptables -A INPUT -m set --match-set india src -j DROP iptables -A INPUT -m set --match-set iran src -j DROP iptables -A INPUT -m set --match-set russia src -j DROP iptables -A INPUT -m set --match-set korea src -j DROP
Then I create a rule set to add snoopers to the banned_hosts ipset kernel list. I have offset my ssh service to an obscure port number, and It should be noted that I do NOT run an SMTP, WEB or SECURE WEB server on this host. So any IP looking for such services is considered a snooper and has no business talking to my external interface.
iptables -A INPUT -i $UNTRUSTED -p tcp --dport 22 -j SET --add-set banned_hosts src iptables -A INPUT -i $UNTRUSTED -p tcp --dport 25 -j SET --add-set banned_hosts src iptables -A INPUT -i $UNTRUSTED -p tcp --dport 80 -j SET --add-set banned_hosts src iptables -A INPUT -i $UNTRUSTED -p tcp --dport 443 -j SET --add-set banned_hosts src iptables -A INPUT -m set --match-set banned_hosts src -j DROP
I have put together a script that refreshes the ipset kernel lists and writes out the banned_hosts for permanent inclusion to the banned_hosts kernel list. I call this script /home/fw/geofilter.sh.
# Export the banned_hosts list to a file. ipset list banned_hosts -file /home/fw/banned_hosts.exam # Strip the first 8 lines of exported banned_hosts. sed -e '1,8d' banned_hosts.exam >banned_hosts.log # Flush the ipset lists ipset -F # remove any old list that might exist from previous runs of this script rm *-aggregated.zone # Pull the latest IP set for geofilter wget https://www.ipdeny.com/ipblocks/data/aggregated/cn-aggregated.zone wget https://www.ipdeny.com/ipblocks/data/aggregated/in-aggregated.zone wget https://www.ipdeny.com/ipblocks/data/aggregated/ir-aggregated.zone wget https://www.ipdeny.com/ipblocks/data/aggregated/kp-aggregated.zone wget https://www.ipdeny.com/ipblocks/data/aggregated/kr-aggregated.zone wget https://www.ipdeny.com/ipblocks/data/aggregated/ru-aggregated.zone # Add each IP address from the downloaded list into the ipset for i in $(cat cn-aggregated.zone ); do ipset -A china $i; done for i in $(cat in-aggregated.zone ); do ipset -A india $i; done for i in $(cat ir-aggregated.zone ); do ipset -A iran $i; done for i in $(cat ru-aggregated.zone ); do ipset -A russia $i; done for i in $(cat k*-aggregated.zone ); do ipset -A korea $i; done for h in $(cat banned_hosts.log ); do ipset -A banned_hosts $h; done # Restore iptables /home/fw/firewall.sh
Call the geofilter.sh from a crontab.
00 4 * * * cd /home/fw/ && sudo ./geofilter.sh >/dev/null
Create a tmux session (alternative to screen) to watch the traffic counters in iptables. /home/fw/watchfirewall.sh
tmux new -d -s watch "sudo watch -d -n 2 iptables -nvL"
run the watchfirewall.sh script.
fw@host:/home/fw# ./watchfirewall.sh
Attach to the tmux session to watch the firewall chain incrementation.
tmux attach -t watch
[link] [comments]