like this
BERTRAM DG7BBA BAB' ZäHLPIXEL likes this.
Wasn't that so funny when the game like #Postal2 or #ShadowWarrior were mocking the playing, making fun of saving-game behavior? For example the #Postal Dude is calling you "Sissy!" when you just saved to often, or he asked you "Did you just saved again?!" Or he is comparing you to his grandma as you save so much the game.
So do you know more computer games where the playable character make fun of you when you save to often? I mean, where is the fun playing the game then? Or games when you choose the easiest difficulty level you are being mocked like Lo #Wang did: "You are tiny grasshopper!"
I think I have to install Postal2 again, I played SW yesterday and it was fun again. And I didn't know that with increasing difficulty level more enemies were spawn on the map, first map 72 instead of ~20.
BERTRAM DG7BBA BAB' ZäHLPIXEL likes this.
Ich binb ja nun ein grosser Fan von echter und guter #Satire, und nicht diese langweilige wie sie von so manchen Komikern kommt. Ich kenne die Webseite virushauptquartier.de
nun schon ziemlich lange und habe heute nochmals nachgeschaut, ob sie bereits #COVID-19 und das ganze Tramtram drumherum satiert hat. Leider musste ich festellen, dass die Webseite komplett eine andere ist.
Wo ist nun die schoene Satire hin? Ich denke, der Web-Archivar wird wohl noch eine Kopie davon haben, aber im Original ist sie verschwunden. Zum Beispiel hatte der Macher der Satire den Satz "Doch ich sage nur: Ab 5:45 Uhr wird zurueckgeimpft!" gebracht, wo hier zweifelsfrei die Ansprache von Adolf Hitler satiert wurde (im damaligen Bezug auf die #Schweinegrippe meine ich, was ja auch doppelsinnig passte ).
Also, wo ist die schoene Satire hin?
BERTRAM DG7BBA BAB' ZäHLPIXEL likes this.
BERTRAM DG7BBA BAB' ZäHLPIXEL likes this.
BERTRAM DG7BBA BAB' ZäHLPIXEL likes this.
BERTRAM DG7BBA BAB' ZäHLPIXEL likes this.
Cool! Today my ordered barcode scanner has just arrived and #Linux has happily detected it:
[5415724.653044] usb 2-6.1: new full-speed USB device number 36 using xhci_hcd
[5415726.189043] usb 2-6.2.1: new full-speed USB device number 37 using xhci_hcd
[5415726.290946] usb 2-6.2.1: New USB device found, idVendor=05e0, idProduct=1200, bcdDevice= 0.03
[5415726.290949] usb 2-6.2.1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[5415726.290950] usb 2-6.2.1: Product: Symbol Bar Code Scanner::EA
[5415726.290951] usb 2-6.2.1: Manufacturer: Symbol Technologies, Inc, 2008
[5415726.290952] usb 2-6.2.1: SerialNumber: S/N:B8BC5A23C069EA479E223DC43B13F757:3
[5415726.298240] input: Symbol Technologies, Inc, 2008 Symbol Bar Code Scanner::EA as /devices/pci0000:00/0000:00:14.0/usb2/2-6/2-6.2/2-6.2.1/2-6.2.1:1.0/0003:05E0:1200.0016/input/input49
[5415726.357180] hid-generic 0003:05E0:1200.0016: input,hidraw1: USB HID v1.10 Keyboard [Symbol Technologies, Inc, 2008 Symbol Bar Code Scanner::EA] on usb-0000:00:14.0-6.2.1/input0
I already did test scans here and I'm happy to say it works neatly!
like this
I still have to manually enter a lot receipts here, scanning may happen not so soon. Still I had some more test scans by putting the cursor into the search field and scan a product. The encoded number then appears in the search field and the onchange
event causes the #AJAX request to update the product table.
I cannot share any screenshots with you here as they contain real data (my bought products). So you have to live with the description here.
BERTRAM DG7BBA BAB' ZäHLPIXEL likes this.
I would like to share a simple #2FA #Bash script with you, you. it is a #wrapper script around the oathtool
program. You only have to then memorize simple names, such as 2fa.sh itchio
or so.
Some examples:
$ 2fa.sh itchio
$ 2fa.sh friendica
So you only have to memorize itchio
instead of your secret key.
Here is the script, public domain:
#!/bin/bash
# Helper script to easier store your secret keys for 2FA, needs
# oathtool being installed
#
# Author: Roland Haeder / Fediverse: roland@f.haeder.net
# Variables:
OATHTOOL_BIN=$(which oathtool)
BASE_PATH="${HOME}/.2fa"
SECRET_FILE="${BASE_PATH}/.secrets"
SECRET_KEY=""
# Check conditions, requires one parameter, oathtool and create base path
if [ -z "$1" ]
then
echo "Usage $0 <service>"
exit 1
elif [ -z "${OATHTOOL_BIN}" ]
then
echo "Program 'oathtool' is not in your path or installed."
exit 1
elif [ ! -d "${BASE_PATH}" ]
then
mkdir "${BASE_PATH}"
chmod 0700 "${BASE_PATH}"
fi
if [ ! -f "${SECRET_FILE}" ]
then
touch "${SECRET_FILE}"
chmod 0600 "${SECRET_FILE}"
fi
echo "Looking up secret key for service '$1' ..."
SECRET_KEY=$(grep "$1" ${SECRET_FILE} | cut -d " " -f 2)
if [ -z "${SECRET_KEY}" ]
then
echo "Secret key for service '$1' not found."
while [ -z "${SECRET_KEY}" ]
do
read -s -p "Please enter it: " SECRET_KEY
done
echo "Adding secret key ..."
echo "$1 ${SECRET_KEY}" >> "${SECRET_FILE}"
fi
echo "TOTP code is:"
${OATHTOOL_BIN} -b --totp "${SECRET_KEY}"
Have fun!
Roland Häder🇩🇪
in reply to Roland Häder🇩🇪 • •Sensitive content
sounds-resource.com
where you can download sounds, including Shadow Warrior hero Lo Wang from, but you need to unhide #NSFW content: sounds-resource.com/process/se…