|
Android is essentially Linux, so if you can root it, you should be able to totally bork it trying to install some other sort of Linux.
|
|
|
|
|
I'm building a linux-based bluetooth speaker that uses speech recognition to display captions for what is playing on the speaker and I'm trying to figure out where to start in terms of where to intercept the bluetooth audio. I understand that ALSA and PulseAudio could be used to intercept audio from applications before they get sent to the audio hardware, but I haven't had much luck figuring out how a bluetooth source can be intercepted. Any help understanding how bluetooth fits into the audio architecture would be appreciated. Here's what I'm trying to do:
Phone->bluetooth->my custom linux-based bluetooth speaker->run raw audio through speech AI->audio out to speakers and captions out to display.
|
|
|
|
|
Seems simpler to run in parallel (i.e. track) than to "intercept" in series. You know the content and you know when it starts; you have one sync point.
It was only in wine that he laid down no limit for himself, but he did not allow himself to be confused by it.
― Confucian Analects: Rules of Confucius about his food
|
|
|
|
|
am I looking for someone who specializes in hardware programming? I have a sound card which is at the same time control surface is the digi 003 console of digidesign. at the time this card was dedicated and only worked with a specific software, protools 7, but as the company was acquired they stopped the software updates and now the control part is unusable, we only have access to the card are and at 2 out of 8. suddenly I was wondering if it was possible to reprogram it, it is in firewire. if it was possible to go into it somehow and unlock it?
suddenly on my 2008 macpro I installed the famous linux studio that you helped me to troubleshoot, thank you again but it's been a while since I wonder if I could not hack my card to be able to use it at 100 %
|
|
|
|
|
Hello folks, I am looking if linux is good enough for cyber security and ethical hacking? What are other OS's that supports ethical hacking and is efficient enough?
|
|
|
|
|
Yes, that should be enough to try out ethical hacking.
You can try Kali Linux.
The sh*t I complain about
It's like there ain't a cloud in the sky and it's raining out - Eminem
~! Firewall !~
|
|
|
|
|
Alternate OS options would include the BSD variants - Open,Net,Free, Dragonfly, etc. You can always install VMWare or VirtualBox and spin up a virtual host to get started.
Keep Calm and Carry On
|
|
|
|
|
If there is an IP hidden after a firewall, how Linux (or any) command should I use in order to know if this IP is alive ? Because PING is not working in this case ...
|
|
|
|
|
You might be able to use nmap to find out. You can use the -Pn option to tell nmap to skip the ping scan to determine if the host is up. Be aware that nmap will try to connect to a wide range of known ports, which might trigger watchdogs on the target network. In general, using nmap on networks that you are not a valid user of is considered bad manners, so discuss with the network owner before using.
Your success will depend on how the firewall is configured. If it is set up to block all access from WAN for that host (e.g. drop all inbound/outbound packets to/from the host you are interested in), you will never get any response from the host. Your only hope may be that you can access a different host on the target network and be able to try to ping or connect to the host from there.
Keep Calm and Carry On
|
|
|
|
|
|
If the target is behind a firewall, and that firewall is configured to quash inbound ICMP, you have no way of pinging the machine.
|
|
|
|
|
Exception - references to RTFM pertinent to subject are welcome.
Please do not clutter the issue with BIOS "stuff".
I am looking for old fashioned flow chart describing Linux ( Ubuntu) UEFI booting process.
I can RTFM for grub, UEFI - however I just do not understand how the entire process works,
I can start with
1. Install Linux using ISO
2. Select GPT partition format
3. Let installer build EFI (boot) partititon etc.
4. After install - on power -up - setup UEFI
5. Then setup "grub/grub2 "
....
6. After initial setup - what files are actually used during NEXT boot process?
/default/grub ?? grub.cfg ??
|
|
|
|
|
|
try complete automated bootup
|
|
|
|
|
I have a single USB drive (RAID5 partitioned ) which was build using mdadm in another OS.
I can identify it using blkid
/dev/sdk1: UUID="fbe4babd-b3c2-8449-66d4-881d46391ff4" UUID_SUB="3f38abb1-3b6a-6663-0829-4241ab1355a6" LABEL="a-SATA:42" TYPE="linux_raid_member" PARTLABEL="MD42_1" PARTUUID="544f03a0-ffff-4255-b0a9-4ff76dbb09b9"
/dev/sdk2: UUID="fbe4babd-b3c2-8449-66d4-881d46391ff4" UUID_SUB="e6552375-0dba-dd6b-1d13-46d885edfff9" LABEL="a-SATA:42" TYPE="linux_raid_member" PARTUUID="5b73b607-39f2-40ca-a028-e599dc5f3756"
/dev/sdk3: UUID="fbe4babd-b3c2-8449-66d4-881d46391ff4" UUID_SUB="bf6527e4-f485-b485-e9a3-eab63fd4c21e" LABEL="a-SATA:42" TYPE="linux_raid_member" PARTUUID="c1fa94cf-572b-47e5-bff4-15122407ff85"
/dev/sdk4: UUID="fbe4babd-b3c2-8449-66d4-881d46391ff4" UUID_SUB="1bbf32d5-eb1b-2805-0057-27bddff7e27f" LABEL="a-SATA:42" TYPE="linux_raid_member" PARTUUID="553743fe-880c-4618-91cb-14692e939062"
/dev/sdk5: UUID="e024cedd-e0e9-4f44-806a-567129fe1a8a" TYPE="ext4" PARTUUID="f94d16e0-d7e0-4ac9-852d-3ef820e523c8"
My current OS gparted obviously does not see md device associated with the array, but it sees the USB /dev/sdx (and all the partitions) , and it does not exist in mdadm.conf file. Also mdadm --detail --scan --verbose cannot see it either - no surprise here.
Is there a SAFE way to recreate RAID5 md device in my current OS?
Can I use mdadm --create ..... to keep current data intact?
|
|
|
|
|
A search for "<your distro> RAID" should lead you to some useful documents.
There is one I can't quickly find that discusses rearranging RAID partitions, changing RAID levels and so on.
That would give you a starting point.
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
So far I have found tools to recover Linux.
I am after restoring specific , already data containing RAID5 array.
Looks as I could used mdadm --assemble
I cannot find anything stating it will keep exciting data intact.
|
|
|
|
|
Message Closed
modified 15-May-23 19:07pm.
|
|
|
|
|
You can use --fake or -f to get mount to test your fstab.
What you put in /etc/fstab depends on what your raid is like. If you're using a hardware raid controller, then the RAID cluster is probably presented to the OS as /dev/sdx, but if you're using software raid, the I think the cluster is presented as /dev/mdn.
After creating your RAID, you'll need to partition and format, just like a normal Hard drive. Once you've done that, you can use blkid to get the UUID of the partition for fstab.
Keep Calm and Carry On
|
|
|
|
|
Message Closed
modified 15-May-23 19:07pm.
|
|
|
|
|
You've got several options. Lets assume that you wan to mount the ext4 partition on /data
You can use the physical partition device path, the UUID, LABEL, PARTLABEL or PARTUUID in fstab
The following are all equivalent. Use only ONE.
# by device path:
/dev/md42p1 /data ext4 defaults 1 2
# by UUID:
UUID=b4f937f3-8d8d-4d1b-a9e6-4eaffb72a077 /data ext4 defaults 1 2
# by LABEL
LABEL=MD42_RAID_LABEL /data ext4 defaults 1 2
# by PARTLABEL
PARTLABEL=MD42_RAID_NAME /data ext4 defaults 1 2
# by PARTUUID
PARTUUID=49fce049-084f-48e8-aa79-f6e22d809879 /data ext4 defaults 1 2
depending on your requirements, you may want to change the defaults , to add perhaps noatime , for example.
Note that we mount the partition not the RAID drive.
Keep Calm and Carry On
|
|
|
|
|
so, i was doing some programming with eclipse and stuff. But then i noticed that all of my .JAR files suddenly looked like a pinguin with some painting stuff on his hands. i need help, cause im not sure what is going on!! I use windows.
[SOLVED] I had to right click a JAR file, and "press open in application" then select Java JDK. For some reason i had two of those...
modified 1-Sep-20 4:02am.
|
|
|
|
|
O M G.
For someone who doesn't want spam, you sure made it really easy for spammers to pick up your email address by posting it in public forums.
YES, they have crawlers that will scan public forums (like these) for an email addresses.
So, if you want to minimize the spam you get, NEVER post your email address in a public forum.
So you don't want spam, but yet you spammed the forums here yourself?!?! Go back and delete your other posts, except for the one in the Java forum.
|
|
|
|
|
So, you are smart enough to guess that the ".JAR files" look something like a Linux, but you want people to connect with you on email threads; won't work man.
The sh*t I complain about
It's like there ain't a cloud in the sky and it's raining out - Eminem
~! Firewall !~
|
|
|
|
|
We already have Crystal Reports built for Asp.net. We are studying the possibility to move the Crystal Reports coded in Asp.net to LInux through Mono, does anyone has experience of this?
|
|
|
|