If you don’t want to authorize yourself all the time on the server, just add an ssh key. 1. Generate
Continue readingCategory: Computer
Begriffsabgrenzung – SW-Entwicklung
Lastenheft vs. Pflichtenheft Beides sind Dokumente zum Festlegen der Anforderungen an das Produkt vor der eigentlichen Entwicklung. Das Lastenheft kommt
Continue readingWhy using the TOR Browser for public APs?
The issue with public APs is that it can be used for MITM attacks, like sniffing network traffic. Workflow Normal
Continue readingDesktop web player (Android)
1. Download web browser Get “Firefox Nightly” from the Google Play Store. (Tried with version 121.0) 2. Configure web browser
Continue readingResponsive iframe (WordPress)
Use the provided CSS classes from WordPress Add the following call in the functions.php file of your current theme, if
Continue readingVM network – NAT vs. Bridge
NAT: Your guests will be hidden in a subnet behind your host. Network Host (192.168.1.1) Guest 1 (192.168.2.1) |-> Guest
Continue readingRemove specific audio/subtitle stream from video
Show available streams > ffprobe video_in.mkv … Stream #0:0: Video: h264 (Main), … … Stream #0:1(spa): Audio: ac3, … …
Continue readingDownload files from page (not listed in source)
Scenario You scroll a webpage an it loads files step by step and you want to download them. You check
Continue readingDownload files from page (listed in source)
Scenario You scroll a webpage an it loads files step by step and you want to download them. You check
Continue readingWhy is ARM using a link register (LR)?
It’s been used for a better performance, but only works for leaf functions. Working szenario (Leaf function) Nice, it’s fast,
Continue reading