Sending a Pull Request on GitHub, Adding a feature to Gossip ( A Rust Nostr client)
Studying source codes are fun (and are a HUGE part of programming jobs), Rust is fun, Nostr protocol is fun and programming is fun; so nothing can be cooler than adding a feature to a Nostr client programmed in Rust :D Hope you enjoy this offline screen cast.
Please note that I created the branch at the end which is not that cool... it better to create the working branch at the very beginning.
00:00 - Contributing on Github 01:10 - Nostr protocol and gossip 04:00 - PR step 1: Forking and cloning a project 05:40 - Working on the project 31:50 - PR step 2: Make sure about the quality of your code 33:15 - PR step 3: Send the PR ... https://www.youtube.com/watch?v=T9hKpYedtpg
Time is important and all operating systems need to keep track of it, even when the computer is not connected to any power source is is turned off! This is done via a clock on the motherboard and syncing it with internet time servers.
In this section we will learn about hwclock, date & timezones and how the GNU/Linux keeps track of time using these tools.
00:00 - Maintain System Time in Linux
02:57 - hwclock and system time
09:07 - timezones and localtime and zoneinfo in Linux
Full LPIC1 course: https://youtube.com/playlist?list=PLFOYXCPEqdNUU55Xvgst8wGTWnz_sd-cj
Textbook: https://linux1st.com/1081-maintain-system-time.html
...
https://www.youtube.com/watch?v=RhH-2I1dBjA
LPIC1 - 032 - 103.4 - Part 2/2
In this section we will see how we can use pipes to *pipe* output of a command to an input of another command. This way you can create a chain of commands to achieve amazing goals; like "count the IPs attacking my server during last hour". Then we will have look at `xargs` and `tee` commands.
00:00 - Pipes ( | ) in shells
06:28 - xargs command
09:30 - tee command
Book chapter: https://linux1st.com/1034-use-streams-pipes-and-redirects.html
Full LPIC1 course: https://youtube.com/playlist?list=PLFOYXCPEqdNUU55Xvgst8wGTWnz_sd-cj
-
...
https://www.youtube.com/watch?v=j3L_7Wxcl0U
In the latest liblzma update, a trusted bad actor called 'JiaT75' implemented a backdoor which allows RCA calls to system() on ssh connections. Here I'm looking into the case and explaining how it works.
Links:
- AndresFreundTec on Mastodon: https://mastodon.social/@AndresFreundTec/112180083704606941
- openwall email: https://www.openwall.com/lists/oss-security/2024/03/29/4
- debian repo: https://salsa.debian.org/debian/xz-utils/-/blob/debian/unstable/m4/build-to-host.m4?ref_type=heads#L63
- Filippo Valsorda on bsky: https://bsky.app/profile/filippo.abyssdomain.expert/post/3kowjkx2njy2b
...
https://www.youtube.com/watch?v=gyOz9s4ydho
In this module, I will show you how to maintain the integrity of your filesystems and what to do in case of a failure. In this section we will cover the checking and fixing ext and xfs filesystems using tools like fsck, fsck.ext, xfs_info, xfs_fsr & xfs_db)
00:00 - fsck
09:35 - e2fsck
09:50 - tune2fs
10:55 - debugfs & superblocks
11:15 - xfs tools (xfs_info, xfs_repair, xfs_db & xfs_fsr)
Full LPIC1 course: https://youtube.com/playlist?list=PLFOYXCPEqdNUU55Xvgst8wGTWnz_sd-cj
Textbook: https://linux1st.com/1042-maintain-the-integrity-of-filesystems.html
...
https://www.youtube.com/watch?v=VjnBzwDYbIY
So you know git (more and less! nobody knows all of git!) and you want to participate on a project on github. For this, you need to fork the repo, clone the code, change it, commit it, push it and send the PR to the main developer.
Looks hard? Maybe... but in reality, its very easy and straight forward. Other than general git stuff, you only need to push one button on Github! In this video I will send a pull request to a project I just found on github.
...
https://www.youtube.com/watch?v=U4LoWM4NzXk
Ever wanted to act on the clipboard info? Ever wanted to *paste* something into the system clipboard? `pyperclip` is a universal library to do so. You can write a script which acts on the clipboard or read/update the system paste memory with ease, lets see in a #shorts 1 min video!
...
https://www.youtube.com/watch?v=hrcQZ9NVO_U
In this challenge we are facing a PNG file with no clue. We will look into its contents and reveal the flag step by step. We will use Python, PIL and CyberChef
...
https://www.youtube.com/watch?v=DVkID9htax0