-
* In lib/functions/rootfs/distro-specific.sh, identify the lines of code that contain the 'x-hack' and replace it with a more modern and reliable shell scripting practice.
* In lib/functions/artifacts…
-
* In lib/functions/cli/entrypoint.sh, identify the lines of code that contain the 'x-hack' and replace it with a more modern and reliable shell scripting practice.
* In lib/functions/artifacts/artifac…
-
Escape the standard input and check if it tries to access any memory location
-
- [ ] [6 Techniques I Use to Create a Great User Experience for Shell Scripts](https://nochlin.com/blog/6-techniques-i-use-to-create-a-great-user-experience-for-shell-scripts)
# 6 Techniques I Use to…
-
Thank you your software.
I have a list of absolute paths to images in a file - how would I read them in to swayimg?
Something like...
swayimg --from-file=myimages.txt
-
### Title
Robustify Macapype
### Leaders
julfou81
### Collaborators
davidmeunier79
### Brainhack Global 2024 Event
Brainhack Marseille
### Project Description
Macapype is pi…
-
Please consider, you do not need access to collective to create pull request or report an issue.
In order to not flood the collective with persons who actually do not need access, please tell us de…
-
Cygwin (and hence MSYS2, which is a derivative) tries to emulate POSIX functionality on top of the Win32 API. When spawning child processes, this means that `fork()` needs to be emulated, which is har…
dscho updated
1 month ago
-
Would that make sense?
-
### How could the content be improved?
The lesson's introduced, conceptually, as a realistic research project analysing data files. However it then almost immediately pivots into doing fairly abstrac…