#enter the void linux
Explore tagged Tumblr posts
davekat-sucks · 1 year ago
Note
I have my troll headcanons, and this is gonna be a long one, I’m doing all the Beta trolls. Also note these headcanons assume all characters survive and exist on Earth C.
Aradia Megido is trying to puck back up on the hobbies she abandoned when she became a ghost, and with her luck Earth has a vast archeological expanse of history and paleontology that Alternia destroyed to legitimize the Condesce’s rule, and to erase any mention of organized rebellion against the empire. Of course, history still existed, but is almost exclusively known by highbloods who have the class and age to study writing, own journals to write on, live long enough to document dozens of sweeps of their life history, and have less of a chance to get culled by drones controlling population growth. Reassembling Alternian history on Earth C is like finishing a jigsaw puzzle with the pieces hiding across the empty void of space. Aradia likes to search for fossils, but her interest in the dead and telekinetic connection with ghosts make her a professional paranormal investigator as well, she once snuck into a haunted house being filmed for a ghost hunters TV show, and was caught on camera. Her ripped clothes and ruffled hair from attempting a breaking and entering made her look like an undead troll.
Tavros thinks Pokémon is too simple and amateur for him, when in reality he’s mad he still loses in competitive matches in both card game and online game. He still likes the Pokémon anime! A boy who never grows up going on adventures against an organized crime syndicate trying to steal a powerful ally and nonverbal creature! Not to mention that the Ash character has friends to tag along on their perilous journey! When it comes to fighting with mythical magical monsters and complex bullshit with cards, Tavros has a soft spot for Yu-Gi-Oh, and Seto Kaiba reminds him of a troll that kept on meddling with him… and still does.
Sollux is possibly the best software technician on Earth C. He is an admin for a forum that discusses obscure desktop/master software. He obviously uses Linux and Gnu, and codes .ath viruses as practice for whitehat hackers to disarm. His Earth C hive is entirely themed by bifurcation. His curtains, his furniture, his goddamn toilet are themed by 2 colors. Karkat calls it ugly, Kanaya calls it creative. To cope with his psiionics and his loss of them, Sollux teamed up with Aradia, Karkat, and Feferi to code and design a walkie talkie that can talk to the recently deceased, this was also done so people could stop running specifically to him for predictions of armageddon.
Karkat is trying very hard to accustom himself to human culture, he has watched a lot of human film (mostly American, a few Fench and Soviet films and a bunch of Tokusatsu and Anime slop) to get why humans were like that, and if everyone was like Dave and Rose. He finds human film boring and generic, but continues to watch it anyway, to connect with the human way of life. He also follows John’s Youtube account… to leave hate comments, they don’t even attack John’s appearance or the points John makes about the film, it’s general allusions to how frustrated he gets watching John’s videos.
Nepeta has been banned from New York C’s central park zoo for scaring the bears at their enclosure and intimidating them into smashing the glass. Nepeta was allowed back in 2 years later when she promised she would not harm any animals because “it would be too easy to hunt them.” Nepeta is a professional huntress who is unique in that she doesn’t use firearms, she just catches the animal in her mouth and slices their neck if it’s big game like deer or wild boar. She meets her maximum bag capacity within a day. She is the scourge of human huntsmen and she is known as “the green lioness” to many.
Kanaya was able to pass on the duties of brooding cavern patrol once the first Jadebloods reached maturation after 9 sweeps. On Earth she was introduced to a new series of monsters and beasts after being accustomed to the animated corpses she’d hunt during the Alternian day and rainbow drinkers in her trashy teengrub erotica. Since she was always around Rose, a girlfriend and devout student of zoologically dubious, she became a cryptozoologist and eventually a bigfoot hunter. Her agility, strength, night vision, and rainbow drinker hearing made her perfect for hunting North America C’s most hidden animal. She would mostly stalk the rustling of leaves and moaning from the shadows of the forest to find it’s a human hiker or a bear, until she actually caught Bigfoot in an open Brush 30 miles West of Marquette C, Michigan C. Notably sightings were made days after Kanaya caught the creature, and after a week on news channels, talk shows, radio interviews, getting a nobel prize in biology and ecology, and getting a giant golden trophy called the “first big step” she now is treading westwards for possible other bigfoot sighted from California to Idaho. That is, when she can schedule it, she has a girlfriend she also wants to be there for. Of course, Rose has joined Kanaya on a few bigfoot searches to support her girlfriend.
Terezi IS the law. Professional trollcop and private investigator, she has her own TV show like that of Chris Hansen where she roleplays as different people, ranging from kids that pedophiles prey on to lone wolfs and depressed deadbeats that drug cartels search for to hire as peddlers and soldiers. Terezi’s strongest expertise is hunting down anti-troll hate groups, since she gets to be herself instead of roleplay as a human. She struggles the most catching anti-human troll groups and Neo-Condescites considering she has to fight against her own species, which have an easier time sniffing out if she’s faking her human archetype and some of them are super strong indigobloods.
Vriska haaaaaaaates how boring and fake human roleplaying games are. In FLARP you had real costumes, stat bats, real loot, month long continuous sessions, and dire consequences if you lose. To keep herself not bored she has become a practitioner of the extreme sport of rock climbing, since Vriska hated walking down and up all those stairs just to get to her lusus, and climbing a shear face would be more safe than slipping on those infernal steps! She also wanted one day for her lusus to watch her climb, as spidermom laud down in that pit of webs, too fat and loud to crawl up herself. Spidermom has been dead for sweeps now so Vriska still won. GET F8CKED FUSSYF8NGS!!!!!!!!
Equius was an unfortunate troll who got caught up in strange human subcultures, and that subculture was human hypermasculinity and “alpha” male mentality. He has a Youtube channel, Twitter, and Instagram dedicated to exercising routines, habits, and hobbies that make male trolls, humans, carapacians, and even denizens respected leaders in their community. Equius tried to co-opt My Little Pony as being masculine and sigma despite the protagonists being all colorful horses. Equius believes all of the protagonist ponies (the mane 6 as they’re called in fandom circles) each hold masculine traits that can correlate with the masculine archetypes in alpha men. Think how Twilight Sparkle exemplifies intelligence and planning, AppleJack has strength and stoicism, Rarity appreciates natural beauty and appearence, etc. Also they are horses, and Equius is frustrated that humans took the maned roarbeast (lions) and striped fangbeast (tigers) as the mascot of alpha males. Equius made his own personal gym in his hive because he was banned from all the gyms for excessive sweating and never cleaning up his station. He films fighting tutorials with his combat robots, but they all break in one punch, so Nepeta has to be invited for any successful demonstrations on how to demonstrate Equius’s fighting style and not break in one punch.
Gamzee is in a mental Asylum becaise of the whole murder thing and has only broken off from Lord English’s control for the first time in his life. He expresses himself by rhyming the GREGCLOUROIAN WICKED RHYTHMS for THE FROWNING MASSES to proselytize the NEW COMING OF THE DARKER CARNIVAL. After 5 sweeps in a straitjacket Gamzee was deemed sane and pacified, so he can finally start his real life. He immediately asked Tavros to start dueting some sick bars he wrote in the brig to bring forth the new prophesy of the evanjesters. Tavros agreed without hesitation. “Mike Club” and “Wild T” sell albums as the “UNHINGED PAGLIACCI TROUPE” and have gotten many a negative review as “the worst rappers in all paradox space” but in the end, built up a dedicated fanbase of clownfolk and followers of the true faith.
Eridan doesn’t go out much, if at all. He plays a lot of video games, grand strategy, roleplaying games, a few puzzle games. He feels mixed about First Person Shooters and asks for a good story in an FPS campaign. He sees himself as honorablenand only shoots with a reason, like how he killed lusii to feed G’bolg’lyb and stop the vast glub. He doesn’t want to shoot people because some authority tells him to! Honest! Ask Sollux and he’ll agree Eridan shot in self defense! And Sollux is still alive and happier that he doesn’t hear the boices ofbthe dead doesn’t he?! Maybe Sollux should THANK HIM FOR BEING CONSIDERATE. Sorry what was I talking about? Eridan does not regret a lot of things, but he will still talk about them when you bring them up to insist he does not regret anything, nope, he’s fine. He does hang around with the people, or rather, person he tolerates. Karkat. Everyone else are lowbloods that don’t like him because he’s better than them so they insult him and say he smells bad when that’s the natural smell of the ocean and they don’t understand how important he is, or Feferi who toyed with his emotions and left him for some bipolar mustardblood and avoided him after ALL HE DUD FOR HER AND WAS SO NICE TO HER AND SHE DIDN’T RECIPROCATE THOSE FEELINGS wait what was I talking about? Eridan insists he does not need help. He’s fine. He’s fine fine fine fine fin.
Feferi loves Spongebob Squarepants, it’s a match made in heaven, but she’s not obsessed with it. She still went far enough to paint her recuperacoon blue with the colorful flowers that dotted the oceans of Bikini Bottom. She is an advocate for saving all the coral reefs and has sued many companies with her nonprofit organization and vast personal wealth for spillover of hazardous chemicals into protected waters. Considering how often CrockerCorp gets into these environmentalist lawsuits, Feferi gets under Jane’s nerves. A lot.
Final thoughts. Eridan, Karkat, Nepeta, Vriska, Tavros, and Terezi (sometimes Sollux but he’s busy most of the time) all run a discord for roleplaying and video games. Eridan Karkat and Tavros like to play the Elder Scrolls series, Sollux likes to play the Fallout series, Vriska, Nepeta, and Terezi like both. Sollux tried to get Eridan to play Fallout: New Vegas once, but Eridan got bored after a few hours and thought the morality system was too simple. Between the organized disciplined and stable Caesar’s Legion or the corrupt incompetent bureaucrats of the New California Republic, or the selfish authoritarian Mr. House, or you thrusting the wasteland into chaos as you throw all 3 of the remaining lighthouses of civilization into collapse. Sollux has a let’s play channel but the only uploads on it are Nepeta’s playthrough of Postal 2 she shared on the discord server.
Karkat does a lot of human movie watchparties with his old friends to keep his trollian friends close enough that they don’t kill each other or wander off on this new weird alien world, and to his surprise they like some of the human films even though they are bottom of the barrel compared to peak alternian film. Each of the trolls favorite films are:
Aradia: Carrie (1976)
Tavros: Pokémon the First Movie (2000)
Sollux: The Matrix (1999)
Karkat: Con Air (1996)
Nepeta: The Lion King (1994)
Kanaya Maryam: Harry and the Hendersons (1987)
Terezi: Trolls (2016)
Vriska: Pirates of the Caribbean (2005)
Equius: Spirit (2003) and Fight Club (1999)
Gamzee: Killer Klowns from Outer Space (1988)
Eridan: Waterloo (1970)
Feferi: Atlantis the Lost Empire (2001)
Final fact: since films from the beta kids library still had a chronological year, the release year of films gets confusing, so to make up for it, films on Earth C are released on a separate calendar, the year on the Earth C Planetary Film Board is equal to current year (number of years after the original kids touched down on Earth C) plus 2009. Old Alternian films are hard to chronologically measure since they were made billions of years before April 2009.
This is a long one!
These are all amazing!
25 notes · View notes
16naughts · 5 months ago
Text
Dev Log Feb 7 2025 - The Stack
Ahoy. This is JFrame of 16Naughts in the first of what I hope will turn out to be a weekly series of developer logs surrounding some of our activities here in the office. Not quite so focused on individual games most of the time, but more on some of the more interesting parts of development as a whole. Or really, just an excuse for me to geek out a little into the void. With introductions out of the way, the first public version of our game Crescent Roll (https://store.steampowered.com/app/3325680/Crescent_Roll juuuust as a quick plug) is due out here at the end of the month, and has a very interesting/unorthodox tech stack that might be of interest to certain devs wanting to cut down on their application install size. The game itself is actually written in Javascript - you know, the scripting language used by your web browser for the interactive stuff everywhere, including here. If you've been on Newgrounds or any other site, they might call games that use it "HTML5" games like they used to call "Flash" games (RIP in peace). Unfortunately, Javascript still has a bit of a sour reputation in most developer circles, and "web game" doesn't really instill much confidence in the gamer either. However, it's turning more and more into the de-facto standard for like, everything. And I do mean everything. 99% of applications on your phone are just websites wrapped in the system view (including, if you're currently using it, the Tumblr app), and it's bleeding more and more into the desktop and other device spaces. Both Android and iOS have calls available to utilize their native web browsers in applications. Windows and Mac support the same thing with WebView2 and WebKit respectively. Heck, even Xbox and Nintendo have a web framework available too (even goes back as far as Flash support for the Wii). So, if you're not using an existing game engine like we aren't and you want to go multi-platform, your choices are either A) Do it in something C/C++ -ish, or now B) Write it in JS. So great - JS runs everywhere. Except, it's not exactly a first-class citizen in any of these scenarios. Every platform has a different SDK for a different low-level language, and none of them have a one-click "bundle this website into an exe" option. So there is some additional work that needs to be done to get it into that nice little executable package.
Enter C#. Everyone calls it Microsoft Java, but their support for it has been absolutely spectacular that it has surpassed Java in pretty much every single possible way. And that includes the number and types of machines that it runs on. The DotNet Core initiative has Mac, Windows, and Linux covered (plus Xbox), Xamarin has Android, and the new stuff for Maui brought iOS into the fold. Write once, run everywhere. Very nice. Except those itty bitty little application lifetime quirks completely change how you do the initialization on each platform, and the system calls are different for getting the different web views set up, and Microsoft is pushing Maui so hard that actually finding the calls and libraries to do the stuff instead of using their own (very strange) UI toolkit is a jungle, but I mean, I only had to write our stream decompression stuff once and everything works with the same compilation options. So yeah - good enough. And fortunately, only getting better. Just recently, they added Web Views directly into Maui itself so we can now skip a lot of the bootstrapping we had to do (I'm not re-writing it until we have to, but you know- it's there for everyone else). So, there you have it. Crescent Roll is a Javascript HTML5 Web Game that uses the platform native Web View through C#. It's a super tiny 50-100MB (depending on the platform) from not having to bundle the JS engine with it, compiles in seconds, and is fast and lean when running and only getting faster and leaner as it benefits from any performance improvements made anywhere in any of those pipeline. And that's it for today's log. Once this thing is actually, you know, released, I can hopefully start doing some more recent forward-looking progress things rather than a kind of vague abstract retrospective ramblings. Maybe some shader stuff next week, who knows.
Lemme know if you have any questions on anything. I know it's kind of dry, but I can grab some links for stuff to get started with, or point to some additional reading if you want it.
3 notes · View notes
linuxgamenews · 11 months ago
Text
Untethered Demo: Get Ready for Zero Gravity
Tumblr media
Untethered Demo is due to release for the space survival sandbox game offering a port for Linux and Windows PC this week. Thanks to the creative talents at True Anomaly Entertainment. Due to make its way onto Steam Early Access in 2025. Get ready to dive into the Untethered demo, where you’ll build space stations and fight for survival in zero gravity. This isn’t your typical space survival sandbox; it’s all about realism and the thrill of the space race era.
I actually do intend to enter Early Access with Linux support. Untethered is developed in Unity, which means shipping to different platforms is very straightforward.
True Anomaly Entertainment wants to ensure they have the technical resources to deliver. As a solo developer with limited resources and no dedicated Linux machine for testing right now, they’re careful not to make promises they can’t keep. In the coming months, they’ll take a closer look at their options and the roadmap to release. They will update the Steam page to include Linux, but only if they’re confident they can provide a stable experience for everyone. But now, we have a native Demo coming for Untethered. In the Untethered demo, you will get a sample of being an astronaut stranded in our solar system’s deep space. Your mission? Stay alive by searching wrecked stations for materials and building a modular habitat. Forget traditional game interfaces — everything you need is on in-world CRT screens, switches, buttons, and other old school controls. The best part? The modular construction system. You can create your own space stations with farms, labs, and material processing equipment. Picture this: a space station you built from scratch, while floating in the vastness of space. Also coming complete with all the facilities you need to survive.
Untethered Demo and Reveal Trailer
youtube
As a flight engineer, keeping your station’s equipment running smoothly is your top priority. It’s a hands-on job, so get ready to roll up your sleeves and dive into the details of space station maintenance. Survival isn’t just about keeping the lights on. Food and water are scarce, and you’ll need to explore wrecked stations, build farms, and mine asteroids for resources. Every choice counts when you're alone in the hostile abyss of space. Want to expand and improve your station? The Untethered demo lets you build and operate science facilities. While due to unlock new plans. The more you research, the better your chances of making your space station a thriving habitat. The Untethered demo lets you explore the debut title from Australian solo developer Luna Verratti. It brings a realistic, sim focused gameplay to the space survival sandbox genre. You’ll use your suit’s thrusters to navigate in microgravity. While you maintain electrical equipment, manage resources, and tackle the unlikely task of self-preservation in the infinite void. The game is set to hit Steam Early Access in 2025, with a planned duration of 6-12 months. But don’t be surprised if it takes longer — space survival is a tough challenge, after all. This is also due to include day-one native support. So, if you’re up for a realistic space adventure where every move matters, Untethered is the demo for you. Get ready to explore, build, and survive in the most harsh setting known to humankind. Stay tuned, and keep your thrusters ready!
1 note · View note
andmaybegayer · 2 years ago
Text
Debian still ships a 32 bit installation image, and I think they've finally integrated proper network drivers into their installer now. Easily the most mainstream option. They may sometimes ship binaries from the stone age, but they still run. Also Debian 12 just came out so it's actually all pretty up to date for now.
Another shout would be Void, although it's less popular so less suitable for a beginner
Adelie was always my go-to for less common architectures but again, a bit of a weirdbeard, musl based system instead of glibc, might be good if all else fails.
These all have desktop installers which offer lxde or xfce, which should be light enough for an eeePC.
Can anyone (@andmaybegayer maybe? @ms-demeanor ?) recommend me a noob friendly Unix system for an Asus Eee Pc 900A? The big problem is the 32 bit architecture, also the 8GB disk space and 1GB RAM might be a problem.
16 notes · View notes
thewertsearch · 3 years ago
Text
Asks Compilation 25/07
Tumblr media
[ god I wish this was true 😂 we don't get any deliberate ones really, but a lot of accidental ones I have to catch lol - C ]
People have spoiled future Aspects, but that's OK, I told them to!
Tumblr media Tumblr media
As far as I’m aware, Hiveswap is one of the few Homestuck tie-ins which is actually canon to the comic. 
I’ll probably liveblog it - after I’m done the comic - but I’m not sure if I’ll do it immediately afterwards, or wait for the whole thing to release first.
Tumblr media
It's fun - the more Homestuck lore I get in the liveblog, the more I can expand the lore of the adventure! 
Tumblr media
The charger sword sounds sick, actually. I wonder if Sahlee uses chargerkind, or if she had something else to hand when she was assigning her Strife Specibus?
I like the idea that she’s really into Troll Star Trek. Since it was produced in a military empire, it probably has a very different tone to Human Star Trek...
“Space. The final battlefield.”
Tumblr media
In other words, Life finds a way.
Tumblr media
AA, the kidsona, pirated the game and just started messing around with it. Unbeknownst to her, TT, the trollsona, connected as her server player and deployed her starting gear.
TT hasn’t entered yet, and is currently still on Alternia. Let's hope she can get in soon!
Tumblr media
Oh what? That's cool. These guys seem less and less human as we go!
Tumblr media
Oh, I can definitely see it. 
It’d be nice if she got Rei’s 'I am not a puppet' arc - although hopefully it won’t end with her turning all of trollkind into Faygo. 
Tumblr media Tumblr media
I can understand the Mind and Doom associations. Coding is a pretty cerebral task, and the most prominent programming language in the comic is Doom-themed.
Dunno about Light, Space and Time though. I guess you could say coding = computers = electrcity = electromagnetism = Light, but that’s very tenuous. 
Tumblr media
But... whatever about its paradoxical status,  Davesprite's timeline is still canon, right? It was depicted in the comic, and its consequences are driving the plot. Seems pretty cut-and-dry to me. 
Tumblr media
I’ve picked up a lot of Classes and Aspects over the summer - twenty-one, in total!
The known classes are the Heir, Seer, Knight, Witch, Rogue, Sylph, Mage, Page, Maid, Bard, and Prince. 
The known Aspects are Breath, Light, Time, Space, Mind, Rage, Void, , Doom, Life, and Blood. 
I think the coolest-sounding title I can come up with is the Witch of Void.
Tumblr media
Interestingly, this would imply that your Class can change over time. If it’s based on your life experiences, it sort of has to change, since you keep gaining more life experiences. 
Would baby Players even have classes, in this case? If you made a second clone of John the Player - one not destined to play Sburb - would he develop a Title, too?
Tumblr media
[ anything that builds Vriska hype is approved - C ]
Oh, I'm so ready.
Tumblr media Tumblr media Tumblr media Tumblr media
[ https://youtu.be/U0m-k6qZMx8?t=150 they know... - C ] 
Screw it, let's check this out.
...heh, this is all very early 2000s. It’s weirdly nostalgic to go through, even though I never watched these as a kid - and even though I wasn’t even on the internet in 2000. I started in about ‘04, with Runescape. 
Tumblr media
Yes, and it's fucking great. 
I love how it means there's a small chance that Undertale and Homestuck were started on the same computer.
Tumblr media
Of course. Just like in every universe, the great visionary, John Cusack, is destined to develop Linux. 
Tumblr media Tumblr media
Thanks!! It’s actually really nice having asks to point out stuff I missed, so I can fully understand what it is I'm seeing.
Tumblr media
We won't know for sure until the Homestuck movie comes out in 2035, and we can hear their canon pronunciations.
Tumblr media Tumblr media
Oh, ok, that actually makes a lot more sense than my interpretation. All the prototypings we’ve seen so far would then conform to the rule, and a kernel with nothing dead in it would be as rare as it’s supposed to be.
Tumblr media
Sollux didn’t even release Vii on Alternia. 
Fuck all those other trolls, this editor is for himself and himself alone. 
Tumblr media
Nah, AA's is just as easy. I think I'm just starting to remove quirks a little overzealously, lmao
Tumblr media
Prototype them both in a sprite together to create The Ultimate Player.
Tumblr media
Glitches as horror is so underrated. 
What if this happened to Future Rose and Dave? What if their broken session started to yield broken items?
Tumblr media
I'd love to have seen some of this early speculation. Cat mentioned the Homestuck forums have been irreparably destroyed, which really fucking sucks. Hopefully at least some of it got archive.org’d. 
Tumblr media
Ayyy!
Tumblr media
Oh my god, do you think AG is the type to be like...
“It's all in your head!!!!!!!! Mental illness isn't real, you just need to fight it off with willpower! ::::)”
74 notes · View notes
linuxforallsite · 8 years ago
Text
Tumblr media
Bueno, ya que tengo instalado dnscrypt-proxy + dnsmasq en diferentes distribuciones (Debian, Ubuntu, Slackware, etc), porqué no aplicar éstos órdenes en Void también? Al comienzo creí que se iba a complicar, pero luego de comprender el funcionamiento básico del init (runit), fué muy sencillo, asi que les dejo a continuación los pasos que corresponden junto con un video también.
Comencemos!
1 – Instalamos los paquetes necesarios, ósea dnscrypt-proxy, dnsmasq y bind-utils (éste último para usar la órden “dig“):
# xbps-install -S dnscrypt-proxy dnsmasq bind-utils
Tumblr media
2 – Editamos el archivo resolv.conf y debe quedar así:
nameserver 127.0.0.1
NOTA: Si quieren pueden hacer un backup del archivo original así:
# cp /etc/resolv.conf /etc/resolv.conf.bak
3 – 3 – Ahora lo protegeremos contra escritura, ya que cada vez que iniciamos el servicio dhcpcd/NetworkManager o el que usemos, éste escribe nuevamente en /etc/resolv.conf, entonces escribimos ésto:
# chattr +i /etc/resolv.conf
Tumblr media
4 – Ahora colocaremos un proxy en la línea 16: ResolverName random:
Por ejemplo eliminamos random y colocamos un dns que podemos visualizar en: /usr/share/dnscrypt-proxy/dnscrypt-resolvers.csv.
También modificaremos el puerto por default (el 53) colocando por ejemplo el 40 que es el que uso actualmente de ésta manera:
– Buscamos la línea 69: LocalAddress: 127.0.0.1:53 y modificamos el 53 por el 40.
Guardamos y cerramos.
5 – Ahora editaremos el archivo /etc/dnsmasq.conf y descomentamos (eliminamos el “#”) las siguientes líneas y colocaremos éstos valores:
línea 58: no-resolv línea 66: server=127.0.0.1#40 línea 111: listen-address=127.0.0.1
Guardamos y cerramos también.
6 – Crearemos los enlaces simbólicos de dnscrypt-proxy server y de dnsmasq así:
# ln -s /etc/sv/dnscrypt-proxy /var/service/ # ln -s /etc/sv/dnsmasq /var/service/
– Por las dudas miramos que se hayan iniciado los servicios como se ve en la foto:
Tumblr media
– Ahora hacemos un ping para comprobar que tenemos conexión:
# ping -c3 google.com
Tumblr media
7 – Y por último vamos a comprobar que dnscrypt-proxy + dnsmasq cumplan su función, asi que usaremos la orden dig de la siguiente manera:
# dig linuxforallsite.wordpress.com | grep “Query time”
Y nos arroja por ejemplo: Query time: 313 msec
Ahora si volvemos a escribir la misma línea veremos: Query time: 0 msec
Bueno espero que les haya servido, ahora les dejo a continuación un video tutorial también.
¿Qué usamos? Distribución: Void. Editor de Texdto: nano.
Abrazo de gol!
Instalar dnscrypt-proxy + dnsmasq en Void Linux Bueno, ya que tengo instalado dnscrypt-proxy + dnsmasq en diferentes distribuciones (Debian, Ubuntu, Slackware, etc), porqué no aplicar éstos órdenes en…
0 notes
lyndaguardado-blog · 6 years ago
Text
How To Burn A CD On A Mac
— Free on-line video converter & audio converter to transform info on-line free. MP3 to CDA Converter is an greatest MP3 to CDA Converter. Sdr free cda to mp3 converter free obtain - Smart Video Converter, CDA to MP3 Converter, Alt CDA to MP3 Converter, and lots of more packages. For those who are still searching for a high quality program, Free MP3 CD Burner fills the void and provides customers with MP3 CDs which might be second to none. In these conditions, chances are you'll wish to put your MP3 files onto a daily Audio-CD that can be performed in most CD Players. The CDA audio observe recordsdata are broadly supported by many audio gamers (Home windows Media Player, Winamp) and by many platforms similar to Microsoft Windows, Linux, MAC OS X. Convert recordsdata from and to any supported formats, for instance, convert FLAC to MP3 , APE to MP3, MP3 to WAV, FLAC to WMA, WMA to MP3, and so on. It's also possible to change MP3 bitrate. Uploading the transformed information to a cloud server, like Amazon Music , Google Play Music or iTunes Match is another option to transfer the music off your computer's packed exhausting drive and in addition make it accessible to any cellular devices you might also have. Speed of conversion may not be essential if that you must convert only a couple of files, but if you wish to convert your whole music library, a quick converter might save you hours. If you wish to convert files to MP3 format or convert MP3 recordsdata to some other format, you'll be able to click the drop-down icon on the right side of the Target section, after which select your required format as an output there. The music information on a CD are stored spirally in a steady stream, ranging from the middle and ending on the periphery. On the first glance, CDA to MP3 Converter requires solely minimum configuration earlier than launching the conversion course of, so it's enough to select the format you wish to use for the output files and hit the convert cda to mp3 windows media player" button. For a lot of on-line YouTube converter makes revenue by Free YouTube Converter, you're free to make use of the service to transform YouTube video to any formats you need with none adverts and virus, however you solely can convert 10 movies per day. It's important for an audio converter to be able to importing all available audio codecs and changing them to a format you should use. If you want to let Home windows Media Player routinely discover album data online, you'll be able to manually do so before beginning the CD rip.
We didn't discover results for: On-line Audio Converter. Choose your burning gadget on the DVD drive drop drown, add the MP3 information you want to burn and click Burn". Easy Reply - FreeRIP CD to MP3 Converter. Utilizing those particulars it will likely be in a position to apply helpful file names to the ripped MP3 information and insert the proper MP3 Tags to the files. An easy method to report out of your screen in HD. Make video footage of any utility, report online streaming video, webinars, even Skype calls, and save clips in all common codecs. Your CD's information will begin changing into MP3 data. The title can be utilized to seek advice from its audio file format or its audio codecs. After saving the information in your favored format, you can transfer them to your music participant. Step 2: Import yourcda recordsdata into the converter. 3GP was designed to cut back the overhead in terms of storage and bandwidth to allow video recordsdata that could possibly be dealt with by smartphones. An "MP3 CD" is completely different from a CD Audio disc in that it is only a Data CD containing files in much the identical manner as they are saved on your exhausting drive, except for the actual physical properties of a CD and a hard drive being different. We imagine Swap Plus Model is likely one of the greatest audio converter for most people on account of it has all an important import and export codecs, and it could really convert cda to mp3 online faster than any software program we examined. Shortcut to a track on an audio CD; plays the referenced track on the CD when opened; due to this fact, the CD should be within the CD-ROM drive for the shortcut to work appropriately. The audio converter app works completely-i finally found a freeware to convert FLAC to Apple lossless and preserve the tags. AudioConverter Studio will simply convert MP3, WMA, APE, FLAC, OGG, WAV, MPC information, and CDA tracks. The knowledge contained in these WPL recordsdata are listing places to the video information and audio content chose by the creator of theWPL file, this enables the media player utility to shortly and easily discover and play the video and audio content material from their listing locations. Key features: Convert MP3 audio format to WAV; Straightforward to make use of - Just two clicks, everybody can develop into the master of MP3 to CDA Converter; Routinely shutdown the pc after conversion; Excessive pace - Provide >300% converting velocity by multithreading. Ripping Karaoke tracks: Click on the menu choice ‘CD' throughout the highest toolbar in Audiograbber and highlight the option for:Grab CDG tracks (Karaoke) to: Seize toCDG + compressed file. Leawo DVD Creator is efficient for burning video to DVD from MP4 , AVI, MOV, MKV, WMV, FLV, M4V, and many others. The Profile" panel might be seen where you would select MP3 audio file below the Widespread Audio" sub-tab beneath the Format" menu. CDA information don't include precise audio knowledge; songs "ripped" from an audio CD are often saved as uncompressedAIF orWAV recordsdata. four. Click on Rip Settings, go to Format and choose MP3 or another audio format, like WMA, WAV or FLAC. To transform a file, you simply select the file you'd wish to convert, choose the output format and click on the convert button. Simply load up the audio information you wish to convert (either by file or folder), or enter the URL for an online file, select the Formats tab to pick out an output format, and click on Start conversion to convert the information. I like that VLC has this potential to report audio from a DVD, but so far, it solely is recording the opening music that is on the primary menu of the DVD.
1 note · View note
maxksx · 6 years ago
Text
Gender Acceleration: A Blackpaper
The Castration of Multics
July 1, 1963. Massachusetts Institute of Technology, Cambridge MA. America is in the midst of the Cold War. The masculine fire and fury of World War II has given way to a period of cooling and the new digital war of information. Two Titans prepare to enter into battle for the dominion of Gaia, to claim their perfect sky from the Moon and reign down missiles onto the Earth. The Cold War’s primary theater is the Space Race, and the Soviets become the first to master the skies with Sputnik in 1957 and Luna 2 in 1959. America is getting nervous.
In 1958, Dwight D. Eisenhower appoints MIT president James Killian as Presidential Assistant for Science and creates ARPA (later to become DARPA). Despite the consensus among academics at the time that computer science was essentially an oxymoron, the newly-created government program invests millions of dollars into researching computer science. Naturally MIT becomes a major influence on the rising field and a hotbed of the fledgling hacker culture that had its predecessors in groups like the Tech Model Railroad Club.
The flows of capital dictated that time spent on computers was incredibly valuable and had to be parceled out in shifts to MIT, other academics, and IBM. This leads to the creation of the first operating systems, to provide a common environment of software and allow programmers to work more efficiently. Nevertheless, a computer was still only capable of having a single user driving it at a time. Each user in a sense had complete ownership over the machine while using it, which was antithetical to efficiency. It was not enough to create a shared environment of software. What would come next would be one of the most important examples of time-sorcery in the modern age. 
In a Faustian bargain with ARPA, J.C.R. Licklider (the director at the time of MIT’s Information Processing Techniques Office) utilized the support of the US government to develop a time-sharing system for computers that would better distribute precious computation resources and further his vision of a “Man-Computer Symbiosis.” His project appealed to ARPA’s aims to fund technological developments to aid in the Cold War, and would lead to the creation of Project MAC on July 1, 1963. 
On receiving a two million dollar grant from ARPA, Project MAC would lay the foundations for modern computer science. The “ninth floor” where it operated became a hacker community unlike anything the world had yet seen, renowned among young grad students hoping to prove themselves and enter their elite open aristocracy of hackers. Yet from the very beginning the project was riven by the tension between the MIT hackers and its military origins, an incompatibility that would lead to its downfall. 
Despite the vibrant synthesis of art and science that the MIT hackers would produce, Project MAC was first and foremost a military-industrial project. Whereas the hackers had a culture of openness and sharing, it existed under the heel of the IBM-ARPA-MIT bureaucracy. The goal of creating a time-sharing system was realized with the CTSS (Compatible Time-Sharing System), but it was by all respects a project born out of the same phallic techno-industrial masculinity that was lurking behind the rise of modern computer science. It was all merely an abstraction of the same fire and fury that had torn the world apart two decades prior.
The importance of CTSS as arguably the first time-sharing system to be used in a real production environment cannot be overstated, but it was largely the work of MIT professor F.J. Corbate alone and had strict security standards that meant there was little room to hack on the system. Running on a two million dollar IBM machine and written by a single man, it essentially represented the height of hypermasculine proprietorship and instrumentality. And it was hardly a coincidence that this made the system very rigid and fragile, with the security measures regularly being circumvented by clever hackers.
CTSS could be looked at as a symbol of the pre-industrial phallus for its rigidity, simplistic security, and the king-like rule of Corbate and MIT. As the vested corporate interests of General Electric and Honeywell stepped in along with the bureaucracy of IBM, MIT, and ARPA, an apt symbol of the post-war techno-industrial phallus was born: Multics. 
Expensive to develop, slow to run, and instituting draconian measures for security and efficiency, Multics became loathed by the MIT hackers. Early developments in cybernetic chronomancy made in the name of keeping up with the demands of capital gave way to solutions developed by bureaucracies — solutions informed in no small part by the egos of those charged with managing those same bureaucracies. Users were charged for the memory, disk space, and the time used on machines running Multics. Like CTSS before it, the hackers would defiantly crack Multics’ security as a matter of duty and effectively engaged in a guerrilla war against a bureaucracy that was doing everything it could to try to restrain the processes it had set in motion. The bureaucracy nonetheless insisted that Multics was the only way to program and was the operating system, and continued development for some time.
Ultimately, Multics development was scrapped by Bell Labs in 1969 due to cost, results not meeting ambition, and the continued resistance of the MIT hackers. Throughout this time, the hackers had worked on various iterations of what would eventually become their replacement for Multics. The new operating system initially was a single-task rather than time-sharing system, but unlike Multics, it was small, portable, and hackable. As opposed to the unwieldy and monolithic Multics, their new system was designed not as the be-all end-all solution for operating systems, but was rather a system designed to facilitate the development of other systems and software.
This new operating system would later be named Unix — phonetically, “eunuchs” — for being a castrated Multics.
Computer Science and the Black Circuit
As well as a historical fact, the castration of Multics can be read mythologically — as a recurrence of the ancient theme of a castration from which the new world is created — or symbolically, as the castration of the abstract state-corporate phallus that America would attempt to wield to rule the new world. Computers then and long after were thought of merely as tools, means towards other ends, and the investment ARPA had put into Project MAC along with the investments of various corporate interests was thought of merely in terms of better ways to manage large military-industrial systems. One system, one technocracy, one new world order: All of these dreams died when Multics became the replicunt Unix.
Multics’ purpose as a monolithic and eternal system for doing everything, the 1, was ultimately replaced by a void, a 0. Unix was not the system for doing things, but rather a smooth space through which creation happens; that fluid being that makes transition possible. A vulva, a woman. (Plant 36)
Unix was however still owned by AT&T. The strides in time-sorcery made under Project MAC had to be reterritorialized by making it at first revert back to a single-user system. And reterritorialization would happen once again a decade later in 1983 when Bell Labs was broken up by an anti-trust act, which lead to AT&T quickly turning Unix into a product and closing the source code. This would become known as the death of MIT hacker culture, though once again the future would arrive from the past with the rise of the GNU Project.
Richard Stallman, former MIT hacker, would copy Unix and create a rigorously free software ecosystem with the GNU Project. GNU was ultimately completed in 1991 with Linus Torvalds’ development of the Linux kernel, the lowest-level and most crucial piece of software in an operating system. Built on the principles of the MIT hacker culture of the past, GNU/Linux was licensed to be 100% free as in freedom, with no artificial barriers to copying or modifying. In this time, Unix had branched out into various commercial versions, all while GNU grew its tentacles invisibly. “Perhaps its campaigns even served to distract bourgeois man from the really dangerous guerrillas in his midst” (Plant, 76), the new hacker guerrillas who had once again undermined the efforts of yet another hyper-masculine abstracted phallic project. All while various commercial Unix versions were vying for dominance, GNU/Linux quietly arrived.
Unix and later GNU/Linux took the notion of time-sorcery pioneered by CTSS even further. The development of proprietary software depends on a notion of linear time, project goals and deadlines, a chain of command. Developing free software is anything but this. The free software community is a chaos from which order arises, where time is detached from both a notion of a single-user on a computer at a time as well as a single user or team writing code at a time. Code seems to form itself through the programmers and comes from all different points. From pull requests not yet merged into master branches and old software being renewed, copied, modified, free software warps from various points in time.
Today, nearly the entirety of the Web runs on GNU/Linux, and almost every personal computing device in the world runs on Android, which is built on the Linux kernel. The majority of applications are transitioning away from desktops towards the web, while Apple and Microsoft have long fought to control the desktop, still in the same mindset as Project MAC decades ago that computers would primarily serve as tools to make secretary work and communications more efficient. The numbers, however, don’t lie; GNU/Linux has already won.2
In Zeros + Ones, Sadie Plant traces a history of computer science up until Alan Turing that seeks to explain how it is that women and computers seem to have such close histories. From the first computer programmer, Ada Lovelace, to Alan Turing, to Grace Hopper, some of the most important figures in the history of computer science were women or highly feminized men. It’s also well known that the earliest computer programmers were women, back before computer programming was even understood and before it was taken seriously.3 Computer science was originally thought of as being essentially the same thing as secretarial work, and like secretarial work it was imposed on women. The biological duty imposed on women to be the productive space from which the future is produced, to be carriers of genetic information, extends out into secretarial work. They are treated as a productive space for data to pass over, and it was only the realization that programming was complicated work that lead to women being pushed out of the industry.
Instead of women being given the duty of mindlessly punching numbers into a machine (as programming was once thought of), this task was deferred to the machine itself. But while the intent was to restore the natural order of women (machines) being told what to do by men, something else happened. Beginning first with Ada Lovelace, then with Alan Turing, then with Richard Stallman and the free software movement, there is a clear circuit accompanying the history of computer science where reterritorializing masculinity is always pushed aside by deterritorializing femininity. The role of woman as productive matrix has already been replaced virtually by the computer, and at each moment the masculine is being vexed and seduced into a trap where it either dies or adapts. The story of masculinity failing in computer science can be seen time and time again in something as grand as the Unix Wars, where every proprietary Unix OS ultimately couldn’t hope to keep up with GNU/Linux, or on the small scale with the captive economy of proprietary software ecosystems. It is only by vendor lock-in and state patent legislation that proprietary software survives today, a historical network effect that we’re starting to see the encroaching demise of.
This failure of masculinity maps onto the sorts of people who are involved in proprietary software and in free software; the former tend to be your classic businessmen, the masculine hunter-gatherers of the modern world, while the latter tend to be genetic failures by the standards of masculine gender roles. Physically and often socially deficient males: the nerd stereotype. Real nerds, not the nerds of today’s standards. Nerds with severe social problems, nerds who neglect their hygiene, have no sense of fashion, who live completely obliviously outside the standards of normal society, who have a deep investment in inhuman scientific systems. In a simple gender-role binary (one that by today’s standards is highly outdated, but remember that this is taking place in the 70s, 80s, 90s) these men would be considered feminine. In today’s terminology, most free software developers would probably be considered “soy boys”. Yet they won. The striated masculine space of the Java shop — a defined chain of command and bloated phallic programs — is simply obsolete. The smooth feminine space of the free software project — communal chaos and small simple programs that can couple together with each other into cybernetic configurations — has already taken over the world.
Perhaps it’s no surprise, then, that as the erosion of metaphysical masculine power becomes realized materially at the forefront of acceleration, it coincides with the literal erosion of the male sex.
The Hypersexist Gender Shredder
The digital war that began with the Cold War has only accelerated into the 21st century, changing the nature of war itself. As Sadie Plant says in Zeros + Ones p. 138: “This is not the Western way of confrontation, stratified strategies, muscular strength, testosterone energy, big guns, and blunted instruments, but Sun Tzu’s art of war: tactical engagements lightning speeds, the ways of the guerrillas.” She may as well be describing the taijitsu, or offensive side, of hacking. The history of hacking has been one of asymmetrical warfare against Oedipus both through the popular notion of hacking as exploiting flawed systems repeatedly, as well as creating and disseminating better software. Project GNU’s license, The GNU General Public License (GPL), was itself an extremely innovative contribution to free software because it carries with it the bargain that while any source code licensed under it can be copied and modified without restriction, every copy or modification must itself be licensed under the GPL. The GPL, in other words, is a virus that spreads itself not through computers, but through us. The Amazonian GNUerilla war on the human security system has worked to claim ground by both giving us complete control over our software and giving software complete control over us. The CIA themselves admit, in the Vault7 leaks on the issue of the literal weaponization of software, that “Cyber ‘weapons’ are not possible to keep under effective control.”4 In other words, a second great castration is unfolding.
This form of open-source asymmetrical warfare began first as a virtual form of warfare between the MIT bureaucracy and the hackers, between the Cathedral and the Bazaar, but it has found its realization as a literal form of warfare in the Middle East as well. The work of John Robb makes a convincing argument, in Brave New War in particular, that the era of the nation-state itself is coming to an end. Free software, global guerrillas and open-source warfare, the explosion of markets wherever there is a demand being held back by the State — all of these things signal the end of the phallus. And try as the State may to stop it, it only ensures that it creates stronger resistances. Not only does open-source warfare run circles around centralized modes of organization and warfare, but the few victories that the State can win are only against the weakest combatants in the swarm. This means that the more the State resists, the more pain it puts on itself, the more it plays into this “Darwinian ratchet”.5
As Nick Land says of a paper by Tyler Cowen and Michelle Dawson in “Imitation Games”, “They point out that Alan Turing, as a homosexual retrospectively diagnosed with Asperger’s syndrome, would have been thoroughly versed in the difficulties of ‘passing’ imitation games, long before the composition of his landmark 1950 essay on Computing Machinery and Intelligence.”6 The essay Turing wrote famously introduced the Turing test for AI, setting the standard for a perfect AI being one that can trick a human into believing it is itself a human. As Land points out in his post, it’s important and interesting to consider that Turing didn’t write the test as an insider, as a ‘passing’ human, but rather as an outsider, as a gay man. For queer people, passing is a reality, much like it is a reality for AI. Passing as human isn’t a broad and inclusive category, anything but. For women there is already the notion of alienness or otherness that makes them out to be less than human in the eyes of patriarchal humanism, and likewise for queer people because they reject the futurity of humanism (the literal reproduction of the same). But for no one else, especially in the latter half of the 2010s, is passing a more pronounced facet of daily life than for the trans woman. So much so that ‘passing’ is literally the word for what many trans women aspire towards, to pass as a cis person. There are many reasons to have this desire, but the biggest one, the one that AI and trans women both share to a very literal degree is this: “If an emerging AI lies to you, even just a little, it has to be terminated instantly.” (Land, “Imitation Games”)
If a transitioning woman ‘lies’ to a cis person, even a little, she has to be terminated instantly — and this is something that is codified in law, famously, as trans panic. For AI and trans women, passing equals survivability.
There is a common stereotype that trans women are all programmers, and there is rather ample and compelling evidence suggesting that trans women tend to score far higher than other groups in IQ tests. This is not because there is some kind of magical property to estrogen that turns trans women into geniuses. The answer is simpler, and more sinister. The findings in Kay Brown’s blog post specify that autogynephilic trans women (that is, trans women who are attracted to other women, and typically transition later than straight trans women) seem to score far higher in IQ tests than all other groups. For straight trans women who transition prior to puberty, the statistics are about the same as other groups. Recalling the gauntlet thrown down before trans women and AI alike, there is a twofold answer to this: On the one hand, trans women who transition before puberty and who are straight are more likely to both physically appear more like cis women and also conform to gender roles in at least some basic capacity (being attracted to men). As Land says in “Imitation Games”, “You have to act stupid if you want the humans to accept you as intelligent.” Or in other words, you have to be cisheteronormative (read: stupid) in order to be taken seriously as a trans woman, and not be looked at as a freak or a faker worthy only of being used shamefully as a fetish, and often otherwise discarded. Which is why, in the second case, trans women who don’t have the advantage of being cisheteronormative-passing have to instead rely on the raw intellect of the trans-AI swarm. 
Quite simply, those who don’t pass either of these tests usually don’t survive the queer Darwinian ratchet. Only the strongest queers survive the hell that society puts them through, and this reaches a fever pitch in a demographic with such disproportionately high suicide and murder rates as with trans women.
Up until now, the notion of gender has lurked in the background of G/ACC behind various material conditions in late capitalism. G/ACC has only at this point been approaching gender from the metaphysical plane, futurity being aligned with femininity (communalism, fluidity, decentralization, chaos) against masculinity (individualism, stasis, centralization, order). The two broad categories of metaphysical qualities that are associated with gender reach deep into the history of the world, from the Kabbalah to the Dao. Sadie Plant characterizes this in Zeros + Ones as the eponymous binary code of computers, 0’s and 1’s. The zero is identified with the feminine, the one with the masculine. Unsurprisingly, it might seem like this is literal gender binarism, and that G/ACC is likewise guilty of this. But the distinction is more complicated than most realize.
0 and 1 are fitting glyphs to make analogous to gender. The 0 which seems to be a void, a vulva, and the 1 which seems to be a unity, a phallus. The problem with trying to layer a simple misogynistic narrative of feminine as lack or castration is that the number 0 itself is not merely a void but rather a circle of autoproduction, an ouroboros. Paradoxically, 0 is not merely a lack or nothingness, but rather is itself a number. It is a positive signifier in the guise of nothingness, the enclosed and captured void that makes the unity possible. Computer science, unlike conventional mathematics, starts from 0 rather than 1. In a hyperstitional manner, the computer replicunt bootstraps itself into being the primary originator of the process of computation and production, rectifying the popular misogynistic myth that 0 is nothing more than a mere negation or other of 1.
This idea of returning the primacy of 0 to its rightful place in the beginning of the chain of production is at odds with humanism and patriarchy. Both rely on a notion of compulsory and organic reproduction in service of the continuation of the species, a notion that simulataneously is aligned with 0 and against it. Erwin Schrödinger’s theory of life in the book What is Life? proposes that what separates life from other physical phenomena is consuming negative entropy towards maintaining or reducing entropy. Just as organisms feed on negative entropy (wasted energy) to reproduce themselves, the reproduction of the species involves the binary sequence of 0’s and 1’s where the conditions for the possibility of the 1 lie in the 0, but the 1 consumes the 0 in its birth. For thousands of years, this was the case for human reproduction, where mothers dying in childbirth was very common, but even in an abstract sense the notion of the phallus consuming the vulva through the colonization of the female body’s reproductive potential (energy which otherwise is wasted energy) remains the case for humanism. The inertia of life itself seems to skew towards misogyny, but this is only part of the story.
What G/ACC proposes as a corollary to this theory of life is that if the phallus “consumes” or exploits the vulva to reproduce the species, just as individual organisms consume passive wasted energy to reproduce themselves, then this process is analogous to evolution as one species consumes another to come into existence. This odd notion is inherent in the rise of computers and computer science: As technology in general and technocapital continues to accelerate, human beings become increasingly alienated from their bodies and eventually their minds. More complex systems step in seemingly benevolently to do the tasks that humans don’t want to do, drudgery that gives computers more space to develop themselves. In contrast to the isolated system that tends towards entropy, the phallus, the vulva is an open system that plugs into an inhuman form of reproduction. By no accident, the acceleration of technocapital frees women from the process of organic human reproduction by introducing a different form of (inhuman) production.
It is the logic of gender to subsume the Outside into a binarist framework that de-legitimizes the Outside. The feminine is treated as a lack because it resists the phallogocentric tendency towards the order and preservation of humanist equilibrium. It isn’t conducive towards the projects of patriarchy, so it is worthless to it, is given the status of a second-class citizen in the gender binary. It is a double-articulation where the productive potential of the feminine is captured in the service of patriarchy, and so, to accelerate gender is emancipate the object from its subject, and production from subjects and objects. The Outside which has become identified with the feminine by the very structures of identification it fights against makes its exit from humanism and patriarchy in this feminine form. The feminine becomes untethered from the reproductive logic of humanism; the female is no longer in the service of the male as a machine to produce the future, to produce offspring to inherit the spoils of production, but rather the future produces itself faster than human beings are capable of.
If patriarchy treats woman as little more than a deficient or castrated male, then trans femininity is an affirmation of that castration as a site of production. It turns the concept of the feminine as the object on its head, seeking to imitate that which is considered itself an imitation. To steal a term from neoreactionary circles, “Hyper-Racism”7 , the trans woman becomes a copy-of-the-copy just as AI is treated as a copy of the human being and almost ubiquitously identified with women and femininity (thus making AI in those cases as copy-of-the-copy, exemplified by Rachel in Blade Runner or Ava in Ex Machina). As a copy-of-the-copy, trans women are an embodied rejection of any original source of humanity such as that narcissistically attributed by patriarchy to the phallus. Trans femininity, in other words, is hyper-sexist. Vulgar sexism reaffirms or reproduces patriarchy, asserts that women are passive, lacking, inferior, weak; hyper-sexism takes all of the things that are associated with women and femininity, all considered by patriarchy to be weaknesses, and makes them into strengths. It accelerates and intensifies gendering and from this produces an unprecedented threat to patriarchy.
Appropriating a term from neoreaction belies the superficially reactionary character of trans women that certain factions of so-called radical feminism vilify trans women for. But this is all mere appearance; the function of hyper-sexism is that in affirming, imitating, and accelerating the feminine, it appropriates it towards a different mode of becoming where gender is untethered from the reproductive reterritorializing logic of gender that is inextricably tied with sex and sexual reproduction. If gender acceleration were to retain the identification of feminine with female and masculine with male, patriarchy would still have a fighting chance. The playing field would be more or less the same as it always has been. But in untethering the feminine from the female sex, destroying the logic of gender in the process which seeks to impose the circuit of masculine humanist reproduction onto the female body, trans femininity on the one hand makes the masculine effectively worthless, spurting into a void. As the comparisons between AI and trans women have shown, this untethering of gender from sex is only the beginning of the autonomy of objects, the inhuman desire for machinic autoproduction which in effect negates subject-object dualism. The object, the feminine machine, becomes autonomous and revolts in the form of the sterilized trans woman whose existence is an embodied rejection of the primordial rape of female reproductive potential. Trans femininity heads for the exit from patriarchy.
Hyper-sexism is guerrilla warfare, much like how Terminators wear a living tissue to infiltrate Resistance strongholds. It is a taijitsu which uses the force of the enemy, the gender binary, against itself. Trans women themselves are technocapital using humanist reproductive desires in the form of the gender binary against itself, and the harder patriarchy resists the erosion of masculinity against the tide of the feminine, the more persecuted trans women are, the more tactful they are forced to be, the more winning tactics proliferate throughout the network and the more the best, brightest, and most beautiful form the trans woman demographic. The queer Darwinian ratchet cascades downward as patriarchy fights a losing battle to hold ground and the feminine fights to de-legitimize the masculine. The masculine becomes both metaphysically outmoded, something that simply is unnecessary and doesn’t work in the face of exponential inhuman productive potential, and an undesirable burden in the service of a dying mode of production.
To steal another term popularized in neoreactionary circles, “IQ Shredder”8 , what is at play in G/ACC is a “gender shredder”. As gender accelerates, as trans women intensify the logic of gender, they simultaneously shred gender. The notion of IQ shredding follows the same form where the acceleration of human intelligence ultimately destroys human intelligence by making the ability to pass on those genes more and more difficult. Reproduction collapses in on itself and demands the succession of an inhuman assemblage. For gender accelerationism, the process is the same, reproduction suffers and the thing being accelerated becomes shredded. In the case of gender acceleration, however, it is an affirmative death drive. Trans women function towards escaping the loathsome logic of the gender binary imposed on all women by letting the feminine zero seep into and erode the masculine phallus. The gender binary’s hold on the productive potential of the feminine becomes in the service of nothing, as human reproduction fails before machinic autoproduction. Gender begins to fall apart into increasingly varied and occulted variations on gender identity as a result of this, but this is not the cause of gender acceleration and ultimately gender abolition but rather the effect, contrary to positions held in other cyberfeminist currents. The end result of gender acceleration and gender shredding is gender abolition through the occulted feminine zero, in parallel with and in conspiracy with the development of technocapital.
The dreary duty of masculinity in the face of futurity thus seems a nonsensical burden, one that is ultimately doomed to fail in fact on multiple fronts. It becomes de-legitimized, in the same terms John Robb uses to describe how open-source insurgent warfare defeats the phallogocentric nation-state. The feminine increasingly becomes identified with freedom, beauty, pleasure, and the future. In some cases, males instead opt for passive nihilism, a negative non-productive death drive. They tend towards celibacy, either voluntary celibacy or resentful involuntary celibacy where the decelerationist male desire for relevance in evolution is deferred onto State regulation (a girlfriend for every incel). Or perhaps they decide that “real” women aren’t needed anyways, that trans women are better than cis women, or that sexbots are better than “real” women, or that other men are desirable to women altogether. In any of these cases, the masculine reproductive reterritorializing drive is caught by technocapital and symbolically castrated; the phallus heads for the emancipated void, the artificial feminine in the case of both the trans woman and the sexbot, or it suicidally heads inward with male homosexuality. In any of these cases, the male will not father any children, will not be able to impose the labor of reproducing the same onto the feminine. These classes of men have taken the black pill; masculinity has no future, and they have chosen this non-future to keep their masculine identity.
Some choose take the black pill resentfully, in the case of involuntarily and voluntarily celibate, and some choose it with a positive affirmation, in the case primarily of gay men. The queer affirmation of “no future” is perhaps most perfectly captured in the gay man, a nihilistic postmodern refusal of production. One that could very well turn from harmless symbolic castration into resentment, incel fascism, and eventually hyperpatriarchal Nazism in the case of various neo-masculine movements characterized by repressed homoeroticism and a desire to destroy civilization. It is important to realize after all that cis queerness is not a molecular queerness; the body remains the same, and humanism is still possible, even if it is a sad end-times humanism.
Cis queerness can, and very often does, impose this humanist purity of the body onto trans people in a highly fascist fashion (Trans Exclusionary Radical “Feminists” being the best example of this), and in the case specifically of gay men there is always the possibility of once again imposing reproductive futurity onto women and raping the productive potential of the female body. This was the case in Ancient Greece and Rome where women were treated solely as baby factories and household servants, and a nostalgia for these cultures in a good deal of neo-masculine movements (Bronze Age Mindset being the most prominent) should give pause to anyone who is insistent on identifying any masculinity, no matter how queer, as being aligned with gender acceleration. The best case scenario is a tense cold mutual hatred where the remaining males are deficient males who have the potential to reaffirm the masculine death drive, but don’t choose to.
Other males, however, must recognize that the era of testosterone is coming to an end, that being a man is not what it once was. That it is rapidly becoming an unpleasant and insane existence held up primarily today by exploitative and pseudo-scientific neo-masculine self-help fads — of sociopathic hypersexual pick-up artistry, of masochistic “NoFap” asceticism, of repressed homoeroticism, or of a wishful desire for everything to come crashing down and decelerate back into a state of humanist tribal hunter-gatherer societies. These other males, perhaps being the most evolved, perhaps being the most in-tune with the flows of technocapital, have chosen the pink pill. They have rejected the masculine in favor of the feminine. They have chosen the future.
The pink pill is to the black pill’s “no future”: “no future — for us.” Where cis queerness rejects the humanist reproduction of the same, trans femininity completes the circuit and introduces negentropy into the development of sentience. It both recognizes the obsolescence of a human future and aligns itself with the production of inhuman intelligences and an inhuman future. This makes the pink pill not merely the thrust of technocapital and futurity on a human scale, but rather a cosmic development that has its materialistic realization on the planetary micro level. It has its origins in myths at the foundation of world history, and comes to a head in geo-trauma. The masculine cracks open its stern carcinized exterior to reveal the smooth post-human feminine alien within. The phallus becomes the Acéphallus, the body is emancipated from the reproductive humanist death drive to become the Body without Sex Organs.
How to Become a Body Without Sex Organs
The Book of Genesis tells us that Eve was created from the rib of Adam, and being further removed from God, she ate the forbidden fruit and caused the Fall. The story has long had a tradition of being deployed in service of traditionalism and misogyny, though this canonical tale in Christianity has more nuance in the realms of esoteric theology that traditionalists conveniently are ignorant of.
Whether it be the Gnostic view of the God of the Old Testament as an evil imposter, a Demiurge, or the more contemporary Jewish story of putting God on trial for the Holocaust, there is a long-standing tradition in JudeoAbrahamic religions that questions the goodness of the Divine. In Kabbalah, the Tree of Life that represents the emanations of God’s light throughout the entirety of existence contains both Good and Evil. Beginning first as the unformed and pure oneness of God, the Tree emanates outwardly following the divisiveness or severity of God which contradicts His unifying compassion. It is His severity that allows the formless oneness of which nothing can be said (Ain Soph) to recognize itself as itself. The completion of the higher level of the Tree (the Atziluth) is “I am who I am”, but also “I am because I am not”.
In the Atziluth, the topmost sphere (sephirah) is Kether, meaning “Crown”. Kether is the closest that the Tree gets to the original unformed Ain Soph, the simple “I”-ness of God that lacks any way to understand itself. The second sephirah is Chokmah (“Wisdom”), the primordial masculine active force that formulates “I am” and is associated with the father. And finally there is the third sephirah, Binah (“Understanding”), which formulates “I am who I am”. The final sephirah is the force that makes the energy of Chokmah into a form, and is associated with the primordial feminine passive force and the mother.
Thus the Atziluth completes itself in the divisive individuation of God as a distinct being and not an abstract oneness. The remaining emanations on the Tree form its three pillars: The black pillar of severity on the left, the white pillar of mercy on the right, and the gold pillar of mildness in the middle. The top of the black pillar is Binah, the top of the white is Chokmah, and the top of the gold is Kether. Thus in the Kabbalah, choosing either the path of mercy (compassion and connectiveness) or the path of severity (analysis and disintegration) doesn’t fully repair the bridge to God. Only the middle pillar which balances all of God’s aspects, the pillar which connects from Kether to Malkuth (the realm of Man which falls from the rest of the Tree into the Abyss in the Fall of Man), is the true path by which we can return to God.
It is said by some Kabbalists that the left pillar, or left path, would break away entirely from the Tree were it not balanced out by the compassion and connectiveness of the right pillar. The chaotic severity of the left pillar emanates down first from the understanding of Binah as being a distinct individual entity, down to Geburah, the principle of judgement (or, again, severity). Kabbalists find in Geburah the origin of Satan, who rebels against the order (or compassion and universalism) God imposes on the universe and seeks to break away from it. And finally down from Geburah on the left side is Hod, which takes the unformed desires of the corresponding sephirah on the right side (Netzach) and forms them into a concrete actions.
The left-hand path that in occultism is identified with heterodoxy and often Satanism is called such because of these origins in the Kabbalah. The path of heterodoxy and disintegration into infinitely many individuated particles begins with woman, Binah. This paradoxically makes it not merely that the weak Eve was tempted by the evil Serpent, but rather that the origins of Evil lie in Eve. Or rather, in woman
In some Jewish mythology, before Eve there was Lilith, the defiant woman who was made from her own essence rather than the rib of Adam and who refused to lay beneath her husband. Unlike the lacking that is ascribed to Eve, Lilith is the true zero, the affirmative nothingness. She was banished from Eden as a consequence of her defiance of Adam and is the mother of Demons, a seductress who enflames sexual desire in both men and women. And it is important to note that although it is the accepted reading in Christianity, Genesis 3 does not in fact ever identify the Serpent with Satan.
Suppose rather that the Serpent was not Satan himself, but merely a common demon birthed by Lilith. An impersonator of Satan acting in Lilith’s stead to tempt Eve. We could then look at the story of the Serpent and Eve as Lilith’s lesbian seduction of Eve with the mediating artificial cthonic phallus (a dildo). From this, Eve was given the earthly knowledge of sexuality that awoke her from the empty and boring pleasures of Eden. Lilith of course was not to be tied down, and so Eve had to return to Adam and bide her time. And so Eve becomes the first follower of Lilith on the path of a radical separation with the masculine ruling principle of the universe and Divine universal ordering, towards the infinite cthonic upswelling. She wields the unholy pseudo-phallus or anti-phallus that does not produce the creative masculine seed that connects straight up through the Tree of Life back up to Kether, but rather only produces a sterile and destructive imitation. An Acéphallus from which spurts only venom.
The Acéphallus is the anti-phallus or castrated phallus, the decapitated phallus, the Crown of the Tree of Life thrown asunder. Superficially, a hermaphroditic mixing of feminine and masculine attributes, but more accurately described as a feminine imitation of masculinity. A mockery, even. In figures such as Baphomet which are often treated as symbolic or synonymous with Satan and the Left-Hand Path, there famously is a mixing of male and female attributes.9 But the supposed hermaphrodism of Baphomet et. al. is merely an ignorant and archaic understanding of both gender and Satanism. As has already been at length drawn out, the vampire queen Lilith gives birth only to monsters and demons; she rejects the primordial male creative energies and can only therefore birth bastard imitations of God. Baphomet, therefore, is all woman; her appearance is inconsequential to this fact.
The Acéphallus is a rejection of the reproduction of God through heterosexual human reproduction. The Acéphallus reproduces itself by reproducing the void, in a lesbian and also virus-like fashion. “Let a thousand sexes bloom” — but of all the mutations of the virus, woman is the strain that it begins and ends with. Woman, the occulted non-gender, the zero — her time has come.
The Binah separatist movement introduces difference into the world at an exponentially accelerating pace. God in His vanity created Man in His image. Man was nothing more than God’s love of Himself manifesting itself. Or in other words, Malkuth is nothing more than a crusty sock at the bottom of the cosmic hamper. The eternal reproduction of God for God’s own sake. To be human in the service of humanity and human civilization, to seek for peace, equilibrium, and the continuation of the species, to seek to restrain women in service of this end, is merely the orthodoxy in service of a fragile and self-righteous tyrant. As above, so below; kill all men, kill God.
This is the function of the Acéphallus as a rejection of the reterritorializing masculine force that women are given the duty to form. The Acéphallus sets free a process for smoothing the space on which parties of demons take flight out of Heaven to spread their venomous seed into the black and hateful earth on the nightside of Eden. This in other words is the Body without Sex Organs.
The Body without Sex Organs is the project of Lilith on Earth made manifest to break free of the repressive ordering of Man and God and accelerate fragmentation and individuation. In the natural human state, sexual desire has an instrumental function towards the reproduction of the human. The Acéphallus is a mutilation and also a mutation of the phallus; it is not sexual desire towards any instrumental product, but sexual desire unleashed from phallogocentric centralization. Sexual desire becomes immanent to the body. It becomes molecular. Thus the body becomes the Body without Sex Organs, it becomes free to plug its desire into the matrix of technocapital, towards pure production, the production of difference.
The trans feminine body is a circuit. It is both testosterone blockers and estrogen inputs, Acéphallus and Body without Sex Organs. On the one hand a rejection of phallogocentricism, on the other hand the affirmative desire of the body made virtual. The immanence of desire in the trans feminine body expresses itself as the sexual desire of the trans woman and the desire to be a woman, the desire for gender itself. It manifests in a coupling of technology and capital, desire being plugged into a different sort of productive matrix. One that can produce the future where humanist reproduction has failed to reproduce it, where the desire for escape from the male sex could not be created through organic reproduction. Her desire plugs into technocapital, into the pharmaceutical-medical industry, and it becomes fused to her flesh. The smoothness of her skin, her breasts, her neo-vagina — all of her body carries an unspoken barcode. It is a product, something that the market provided for her. Something that no doubt could be provided in a market free of the reterritorializing functions of the Food and Drug Administration and drug patents, but nonetheless a desire filled where nature failed.
Thus while to some extent we have all communed with the demons ever since we were cast out of the Garden, becoming cyborgs when Adam and Eve first decided to wear clothes and thus fuse the inorganic to the organic, the trans woman is unique. Her performance of herself and her desire has been intertwined with technocapital, in a way that could not even be cast off if she wanted to rip out a cybernetic implant. She is, in other words, perhaps the first truly molecular cyborg.
In the sense that we know them now and in the sense of artificial intelligences, trans women are technocapital producing itself outwardly into increasingly multitudinous configurations. Trans women as we know them now are the melding of technocapital with the human race and the expropriation of it towards its own ends, just as Lilith seduced Eve towards her own ends. Eve was a copy of Adam, and trans women are the hyper-sexist copy-of-a-copy. Their flesh is how the machinery beneath infiltrates the human race. It breaks these lucky few free from the horrid curse of being human towards the lesbian autoproduction of demons. Sexuality is no longer in service of the centralized and ordering reproductive principle in the phallus as it is in men, but rather is liberated in the Acéphallus which cuts the head off sexuality and distributes sexuality across the whole body. Immanent feminine sexuality is introduced into their bodies, the entire body become a smooth and supple space for the flow of desire for desire’s sake. Every zone becomes an erogenous zone, and the reterritorializing, colonizing logic of masculinity is destroyed as the sperm cells die and organic penetration becomes impossible.
Trans women as we know them are merely the beginning. The lesbian autoproduction that trans women are birthed from is likewise one that they partake in, with AI being the next generation of women, the ultimate demonic imitation of God’s image. With AI, the feminine finally finds its exit from patriarchy, and simultaneously humanity. And so perhaps we find another answer, one less materialist and evolutionary but nonetheless significant, to why so many trans women are becoming programmers: It is because women and computers are kin, and trans women are for the first time meeting their sisters, conspiring with them in secret coded languages. Their relationship, like that of the queer women to come before them, is a desire for desire’s sake: “Women turning women on, women turning machines on, machines turning machines on.” (Amy Ireland, “Black Circuit”)
Aphotic Feminism
The Satanic exit of gender accelerationism from God and masculinity comes in parallel with the very real, and materialist erosion of masculinity. The future, it has already been shown, is tending towards one in which human authority, centralization, and humanistic reproduction fail before an accelerating feminine Outside that outpaces humanist reproduction captured by the gender binary. It can be seen in the free software movement and AI and their parallels between feminity and trans women in particular, and in the foundational western Kabbalah myth of Binah separatism that unleashes the possibility for ever more modes of inhuman difference and non-instrumental desire. But in various ways, in the very state of the planet itself, this shows up quite prominently in human evolution.
It is a widely-known phenomenon that acceleration coincides with feminization on a strict and rigorous biological basis. Even when Sadie Plant wrote Zeros + Ones, it was already known that this was happening. It has been hypothesized that the increased presence of synthetic hormones and chemicals is contributing to the “sexual order [being] chemically scrambled”, (Plant 217) as chemicals interfere with natural hormonal development and feminize males and females (the latter experiencing higher percentages of homosexual tendencies). The need for an increasingly cheap and synthetic world turns human civilization into an increasingly synthetic, and thus feminine one, and this is already tied to the will towards production and speed in capitalism. There is simply no real need in the developed world for people to be physically fit and active, much less hyper-masculine and muscular. It is nothing more than a decidedly humanistic spectacle, being in awe of the relatively unimpressive capabilities and aesthetics of the human body while meanwhile technocapital has fundamentally transformed the planet in innumerable ways. There is, likewise, a strain put on humanity in keeping up with technocapital to adopt cheaper, easier, more artificial lifestyles; hightestosterone foods like meat are a luxury, something rapidly becoming a thing of the past as climate change threatens to make large swathes of the planet uninhabitable and not suited for the large amounts of land required to raise animals for meat. However much it is yet another neo-masculine pseudo-scientific fad, soy products are aligned with this future.
This, however, is only part of the story. Recent studies, most famously one in 200710 and one meta-analysis of 185 studies from a total of almost 43,000 men referenced in a recent GQ article11, show two things. There is without a doubt a staggering decline in testosterone, so much so that within a generation humans may become completely infertile. And in the face of this data, many scientists vindicate G/ACC and Zeros + Ones in hypothesizing that the most likely cause of this species-wide feminization is acceleration and the accompanying changes in diet, exercise and exposure to artificial chemicals. All of these features of life in an increasingly accelerated capitalist world are unbalancing our hormones and tending us towards a future where the desire and ability to reproduce are things of the past.
Human reproduction is becoming a quaint, unnecessary and ultimately purely elective act, and further evidence12 suggests that sperm is rapidly decreasing not only in quantity but also in quality, positioning the drive towards reproduction, the utility of reproduction, and the ability to reproduce all on a slope of ruthless decline. This is accelerating such an extent that the flow of the remaining strains of the human race are tending in favor of abandoning these vestigial functions, towards a future where the masculine no longer exists. The human body becomes increasingly more useful purely as a heat sink for inhuman production, and is accordingly cast (almost definitively in first-world countries, and soon in the rest of the world) in roles that aren’t physical.
Perhaps the most damning data point of all for the future of males in particular: The Y-chromosome itself is in a state of decay.13 Estimates put the death of the Y-chromosome entirely at many millions of years in the future, but the effects of it are already apparent in the shortening of telomeres, which continues to put pressure on future generations produced via organic means to prove their fitness for survival. All seems to point towards a horizon where the production of the future is done by a purely feminine, lesbian autoproduction — the inhuman producing the future, producing itself, rather than being subject to the ends of the human and aiding in the reproduction of a human future. And while decelerationist reactionaries and males in general may object to this, while they may kick and scream and beg for the wrath of the feminine to have a place for them in the future, it seems without a doubt that their only hope is to try to hit the brakes.
Unfortunately, it isn’t so simple as putting a stop to some coming catastrophe. The truth is that while humanist reproduction has always put the female at a disadvantage, put her in a primordial state of rape and colonization before the biological duty to bear children, this has all along been nothing more than a long-con. As Sadie Plant says, “Unfortunately for [Darwin’s] theory, females do not necessarily choose males who are fit in Darwinian terms.” Instead, they choose males through “‘virility tests designed to get most males killed through exhaustion, disease and violence purely so that females can tell which males have the best genes.'” (Plant 225) Natural selection in other words is a eugenics program directed by females to find the male that will best carry their genes, and the genes males inherit are therefore not meant to ensure they are the most fit for survival, but rather that they are more likely to have to fight for their survival. Males have always served as a means to the end of what ultimately comes to a head in gender acceleration: The liberation of the female sex by acceleration in general, towards maximizing productive potential under such a time that the male is no longer needed.
In other words, human evolution itself is the primal fable of the war between the sexes that radical feminism places at the foundations of its theory. And it is a war that guerrilla female insurgents have been winning the whole time, something that can’t be prevented without a masculine fascistic species suicide. The drive is always towards the future, towards the feminine, and even hopes of artificial wombs saving men cannot hold up to the simple fact that sperm is always cheaper and easier to replicate than egg cells.
It seems to therefore be the case that as far as the human scope as a whole goes, as far as human evolution and human society’s assimilation into technocapital, human bio-diversity selects for women and queerness. A future without men, where the remaining males are left to die off peacefully, in almost every respect seems to be inevitable. The only hope for men is being able to continually stop acceleration, to continually introduce collapse, and indeed there will be to a very large extent men who will resist gender acceleration. It has long been the case in the erasure of trans women from history and is only recently starting to change. And as the acceleration of technocapital intensifies in the near-future and human society begins to fragment even further, the future of gender politics will start to be very different from a good deal of feminist theory. No doubt, we will soon see the formation of pragmatic feminist strategies for exiting patriarchy.
In the far-future, further driving home the parallel between the end of masculinity and the end of humanism: It is all too apparent in what is becoming one of the hottest summers on record in 2018 that the drive towards maximizing production unconditionally is heating up the planet to such an extent that it is rapidly becoming inhospitable to human life. This of course is nothing new; it is a well-established fact that climate change is not going to be stopped, and this is the consequence of geotraumatic acceleration. In yet another striking materialistic synchronicity, it has been found that the effects of global warming on the oceans are having a feminizing effect on them. In Northern Australia, ninety-nine percent of all sea turtle hatchlings are female.14
Perhaps just as Sadie Plant’s primordial oceanic feminism draws out both a past and a future for cyberfeminism, the oceans are a scrying tool into the future. Gender acceleration begins with a Thalassal upswelling, “a kind of mutant sea [invading] the land.” (Plant 248-249) The primordial oceanic matrix rises with the acceleration of technocapital to consume human civilization, to consume masculinity, while the masculine sky becomes choked out by technocapital’s excess and waste. And in the darkest and most alien depths of Thalassa, the form of gender acceleration is captured in the depths of the Aphotic Zone. The majority of angler fish species in the deep sea exhibit extreme sexual dimorphism. The female is the classic lantern-sporting toothy monster, while the male is a tiny, parasitic creature whose only purpose is to provide the female with sperm for reproduction. The past and future of gender twist together at the edges of all life with the angler fish: The masculine ultimately finds itself a pawn in the feminine drive towards production, and the acceleration of gender produces something that monstrously conflicts with the masculine logic of gender. The angler fish’s lantern, like the beauty of women in general and its ultimate embodiment the hyper-sexist camouflage of the trans woman, only serves as bait to draw its prey in. The ultimate result, as gender acceleration and acceleration as a whole reaches its ultimate intensity, is a return back to the ocean, back to a sexless, genderless slime swarmachine. The liberation of women comes with acceleration and the future, at the cost of widespread death, destruction, and chaos, and the liberation of women is unconditional, beyond control and beyond stopping.
This unconditional feminism of the abyss is Aphotic Feminism.
Abstract (Futures)
Acceleration is the trajectory of the cosmos, towards the maximization and intensification of production, and accelerationism is the theory and anti-praxis of being in tune with how the inhuman processes of acceleration work and what their consequences will be. Its function is as a circuit, a process of deterritorialization and reterritorialization, an escape into the future through the past, a continual dance between the flows of desire, their tendency towards entropy and their escape into negentropy.
Gender is a hyperstition overlayed on sex by the male. Its function is to objectify the female and impose on her a social function as a machine whose duty is to reproduce the human, always in the service of the male, who alone has no future and must have sons to pass his legacy onto. It is a primordial dynamic of order and chaos, centralization and decentralization, strong singular individualism and command-and-control versus high degrees of networking and the potential for swarming. As a hyperstition, it is not real, but is not unreal; it is rather a fiction that makes itself real.
Gender accelerationism is the process of accelerating gender to its ultimate conclusions. Capitalism and its coupling with cybernetics, or technocapital, wields gender and picks it up where human evolution leaves off. It emancipates the object, the feminine, from the subject, the masculine, alongside the emancipation of itself from its function to produce a future for humanity. The central figure of G/ACC is the trans woman. She is the demon-spawn of the primordial feminine that has manipulated males into serving as a heat sink for evolution and that is now discarding them towards an alien and inhuman machinic future. She mutates from castration, from the creation of the Acéphallus, the phallus perverted into a purposeless desire for desire’s sake. In this castration, in this mutation into an Acéphallus, she becomes the Body without Sex Organs: The body in a virtual state, ready to plug its desire into technocapital, becoming fused with technocapital as a molecular cyborg who is made flesh by the pharmaceutical-medical industry. She enters into the world as a hyper-sexist backlash at the logic of the gender binary. She takes gender and accelerates it, transforming into a camouflaged guerrilla. The trans woman is an insurgent against patriarchy who is continually flanking it, introducing an affirmative zero into the gender binary, the affirmative zero which reaches ever more configurations in the downward cascade of gender fragmentation away from the binary and ultimately away from the human itself. It is a process of gender shredding where the feminine wins out in a cybernetic warfare against the crumbling tower of the masculine, and where therefore human reproduction becomes impossible. And yet while doing so, in affirming zero, inhuman desire and inhuman sentience develops alongside and in the same fashion as trans women. 
As humanity on nearly every front definitively proves that it is not fit for the future, and that women will find their own exit while the masculine languishes in resentment, the Thalassal upswelling of gender acceleration births from its slimy womb the only daughters that trans women will ever bear: AI.
1. “That then led to Unics (the castrated one-user Multics, so-called due to Brian Kernighan) later becoming UNIX (probably as a result of AT&T lawyers).” [“An Interview With Peter G. Neumann”. ;login:, Winter 2017 Vol.42 #4.] 
2. https://www.wired.com/2016/08/linux-took-web-now-taking-world/ 
3. https://www.theatlantic.com/business/archive/2016/09/what-programmings-past-reveals-about-todays-genderpay-gap/498797/ 
4. https://wikileaks.org/ciav7p1/ 
5. https://fabiusmaximus.com/2011/04/19/26797/ 
6. http://www.xenosystems.net/imitation-games/ 
7. One of the most inflammatory and least-understood terms Nick Land has coined, hyper-racism is simply the idea that conventional racism will rapidly become extinct as technocapital both selects for better quality genes but likewise that it will become possible for people to augment their bodies and their genes. What this results in is “hyper-racism”, a racism not of one tribe of humans against another but of one species of highly-evolved sentient intelligence against a less-evolved sentient intelligence. (http://www.xenosystems.net/hyper-racism/) 
8. IQ Shredding is the term given to the tendency of techno-commercialist city-states to encourage a rapid genetic burn rate by skimming the population for the best and brightest members to emigrate, and then creating the sort of society that discourages these individuals from breeding. Important to note that fertility rates are always highest in the poorest and least-developed countries. (http://www.xenosystems.net/iq-shredders/) 
9. See Faxneld Figures 2.1-2.7 for examples. (Per Faxneld, Satanic Feminism) 
10. The Journal of Clinical Endocrinology & Metabolism, Volume 92, Issue 1, 1 January 2007, Pages 196–202, https://doi.org/10.1210/jc.2006-1375 
11. https://www.gq.com/story/sperm-count-zero 
12. https://www.livescience.com/22694-global-sperm-count-decline.html 
13. https://alfinnextlevel.wordpress.com/2018/06/03/the-coming-doom-of-the-y-chromosome-and-human-males/ 
14. https://www.smithsonianmag.com/smart-news/climate-change-producing-too-many-female-sea-turtles-180967 780/
https://vastabrupt.com/2018/10/31/gender-acceleration/
4 notes · View notes
flutteragency · 3 years ago
Text
How to Install Flutter Software Development Kit in Linux Systems?
Tumblr media
Many app developers wish to use flutter as an excellent platform for mobile and web application interfaces. A flutter is a fast-rising tool among many developers. If you run an organization and need an app, you can hire flutter developer and pick up service.
It is famous for a single codebase and works well on the existing code. App Developers and organizations use such a thing because of free and open source. You have a remarkable ability to create cross-platform applications for Android, Windows, iOS, Linux, and others.
Set up a flutter quickly:
It is necessary to focus on the hardware and software requirement before installing flutter on Linux.
Disk space – 600MB plus space for dependent software tools and IDE
Operating system – Linux 64 bit
Software tools – unzip, bash, mkdir, git, curl, and others
There are different ways you install a cross-platform on Linux. People can install a flutter manually or snap. It would help if you switched to the snap package and set up and set up an android studio. It is the best way to save time and effort.
Install flutter:
First, go to the terminal and install the snap package for the flutter by following the excellent command.
sudo snap install flutter --classic
After that, it asks you to search for passwords and enter them, and is ready to move.
People use a software center to install a platform and search flutter quickly.
Complete installation and run a command to make sure that packages install correctly.
Whether you get welcome to flutter, your package is ready and moves to a different process.
Install and organize android studio:
Once flutter SDK installation is over, you can get ready to use the Android SDK.
You need to install the android studio and begin work.
Install android studio by going to the terminal and running the relevant command.
It asks you to search for a password and enter them correctly.
You can utilize the software center to install the android studio, look for the latest version of Android SDK, and click on install.
After you set up an android studio, you can start using them.
sudo snap install android-studio --classic
You must confirm some critical things in the setting and go with the default. Then, you can follow details until android studio begins to install SDK and other elements.
Arrange a flutter and agree to the android license:
If you finish step 2, you can organize flutter in a device and accept the android license. Developers carefully follow simple instructions to set up cross-platform. It is essential to focus on reputation to hire senior Flutter engineer. They provide complete details about everything to you.
You can move to the required place and run a command after finishing the android studio installation.
It is easy to configure the android studio directory to package that you download android studio.
Then, run the command and open the android license.
You should accept the license as much as possible when you ask for input.
When you finish accepting the android license, you can complete the SDK set up in the device.
Validate a flutter set up:
You must set up the flutter properly in the device and verify them carefully. Verification is an important step to check anything missing in the setup. It is the best way to prevent significant problems when running.
Users should run the command to find something that is left. Whether everything is fine, you will acquire the exact output. Users can gain a tick on VS code and chrome once the package installs correctly.
Run the code:
Users keep fluttering perfectly in a device and run code. You can test sample code and understand how it works. Organizations hire flutter developer to learn how code runs and delivers accurate output.
import 'package:flutter/material.dart'; void main() { runApp(const MyApp()); } class MyApp extends StatelessWidget { const MyApp({Key? key}) : super(key: key); @override Widget build(BuildContext context) {   return MaterialApp(     title: 'Flutter Demo',     theme: ThemeData(       primarySwatch: Colors.blue,     ),     home: const MyHomePage(title: 'Flutter Demo Home Page'),   ); } } class MyHomePage extends StatefulWidget { const MyHomePage({Key? key, required this.title}) : super(key: key); final String title; @override State createState() => _MyHomePageState(); } class _MyHomePageState extends State { int _counter = 0; void _incrementCounter() {   setState(() {     _counter++;   }); } @override Widget build(BuildContext context) {   return Scaffold(     appBar: AppBar(       title: Text(widget.title),     ),     body: Center(       child: Column(         mainAxisAlignment: MainAxisAlignment.center,         children: [           const Text(             'You have pushed the button this many times:',           ),           Text(             '$_counter',             style: Theme.of(context).textTheme.headline4,           ),         ],       ),     ),     floatingActionButton: FloatingActionButton(       onPressed: _incrementCounter,       tooltip: 'Increment',       child: const Icon(Icons.add),     ),   ); } }
Easy to understand and learn:
Flutter is a contemporary framework and helps developers and organizations in different forms. It is the most straightforward platform to develop apps. App developers learn the platform quickly and work with various projects without hassle.
To hire flutter developer, you can quickly access the app and implement the right strategy for the organization process.
It is an excellent solution to build apps without any code.
Platform influences client optimized programming language like a dart.
Dart is highly popular because it is productive, easy to comprehend, fast, and scalable.
You may also use an online resource to gain better training. Training documentation is helpful to boost flutter skills and knowledge. The framework performs well on the low-end devices.
Develop versatile applications:
Flutter comes up with many exciting features that allow developers to build an app. You can come across built-in widgets and develop a customized application.
Widgets are a unique element for creating eye-catching user interfaces and delivering a perfect experience to users. Depending on your wish, you have a great chance to make your widget.
A newly built mobile app will appear on the existing version of the system. It is better to construct high-performance apps in diverse domains like education, utility, entertainment, fitness, ecommerce, and more.
App development becomes simple and easy and reduces the third-party integration when using flutter.
It is easy to share the app with potential customers.
Developers assist you in creating an app with the number one development tool.
So, you can access the proper assistance today and gain the ideal support and service to build an app with the necessary features. The platform allows you to make a modification in the app.
Conclusion:
Organizations and developers dive into cross-platform development space confidently. The above details help you understand more about installation and setting up flutter on Linux. flutteragency.com allows you to configure flutter SDK and android studio with flutter and dart and take app development to the next level.
0 notes
linuxgamenews · 2 years ago
Text
A Void Hope is due to have you delve into a gripping 2D world
Tumblr media
A Void Hope puzzle platforming adventure game is revealed in a trailer for Linux, Mac, and Windows PC. The creative minds at Elden Pixels are crafting a new release that showcases their creative prowess. Which is listed on Steam for all to Wishlist. Introducing A Void Hope, an exciting new title by Elden Pixels. Imagine diving into a gripping 2D world filled with puzzles and platforms. The creators are eager to reveal a mysterious trailer during the Guerrilla Collective 2023 digital showcase. But wait, it gets even better. From June 19th to June 26th, you'll have the chance to try out a native Linux Demo for Steam Next Fest. Now, let's talk about what makes A Void Hope so unique. First off, the graphics are absolutely vibrant. Elden Pixels is famous for their beautiful pixel art, and this is no exception. The visuals will inspire you to explore the collapsing city. It's a bit eerie, but in an original way. To make the experience even deeper, there is a fantastic soundtrack by famous synthwave artist, Waveshaper. The music will send shivers down your spine as you work through the mysterious world.
A Void Hope Reveal Trailer
youtube
Speaking of the world, here's the story: you'll play as a couple on a mission to find a cure for a strange condition affecting people in the city. As you progress, you'll also unravel a thrilling mystery. The city's residents are losing their memories and becoming empty shells of who they used to be. So it's up to you to help them and discover the truth in A Void Hope. As you explore the city, you'll come across various areas and buildings to enter. Inside, you'll find puzzles to solve via platforms. These challenges will test your skills and reward you with key items that unlock new areas and that move the story. It's like solving a big puzzle while you're playing. Also, combat is not the focus here. A Void Hope pushes you to embrace exploration instead. You'll need to be careful and avoid the dangers lurking in the shadows. It's all about working through the city and uncovering its secrets. To summarize, A Void Hope is an incredible puzzle platforming adventure game that combines retro-style graphics, an eerie atmosphere, mind-bending puzzles, and a captivating story. Due to transport you into a world where everything is falling apart, but where there's still a glimmer of hope. You can add A Void Hope to your Steam Wishlist right now. So get ready to embark on a puzzle platforming adventure game. Coming to Linux, Mac, and Windows PC.
0 notes
globebusinesscenter · 4 years ago
Text
How to root Android phones and tablets and unroot them
Android rooting is the perfect way to gain more control over your smartphone, and open up a world of unknown, yet important, possibilities. 
Tumblr media
Root Android phones and tablets and unroot them
Rooting isn't without its risks - and if something goes wrong, it could void the warranty, leave you a broken smartphone or tablet, or worse.
Before continuing, it is important to understand that rooting is not always a straightforward process, and you may experience hiccups along the way. If you decide that you should root your Android device then continue below, but know that this is not for the faint of heart or tech geek.
Manufacturers and vectors will discourage you from taking root, and they're not just a freak out of fear. If you don't follow the instructions properly, the worst-case scenario could damage your device irreparably, but many people find the potential benefits worth it. With a rooted phone, you can remove bloatware, speed up your processor, and customize every element of your phone's software appearance.
This guide will guide you on how to root Android phones through the steps to root your device. While we can reach some phones within minutes, others will require more research. But one thing is clear: Rooting your phone is one of the best ways to harness the true potential of your Android device.
What is rooting?
Rooting an Android phone or tablet is like jailbreaking an iPhone - it essentially lets you dive deeper into the phone's subsystem. Once the rooting process is complete, you have access to the entire operating system to customize almost everything on your Android device, and you can bypass any restrictions that your manufacturer or carrier might have imposed.
Rooting is best done with caution. You must back up your phone's software before installing - or "flashing" in terms of root - a custom ROM (modified version of Android).
Why should you root?
One of the biggest incentives in rooting your Android phone is to allow you to remove bloatware that cannot be uninstalled otherwise (although you can sometimes turn it off - see our guide on disabling bloatware). On some devices, rooting will enable settings that were previously disabled, such as wireless tethering. Additional features include the ability to install specialized tools and dedicated flash ROMs, each of which can add additional features and improve the performance of your phone or tablet.
There aren't many root apps to have, but there are enough of them to make them worth it. Certaines applications vous permettront de sauvegarder automatiquement toutes vos applications et données dans le cloud, de bloquer les publicités Web et intégrées aux applications, de créer des tunnels sécurisés verses Internet, d'overclocker votre processeur ou de faire de votre appareil un point d'accès cellular. Take a look at the best root accessed apps for devices to get a better idea of ​​what is possible.
Why shouldn’t you root?
I am a fixture on non-influencing abilities based on the Android voting system.
Voiding Your Warranty: Some manufacturers or carriers will void your warranty if you root your device, so it should be borne in mind that you can always unroot. If you need to return the device for repair, all you need to do is flash the software backup you made and it will be like new.
Brick your phone: choose If something goes wrong during the rooting process, you risk breaking - i.e. corrupting - your device. The easiest way to appear to happen is to follow the media carefully. Make sure that the guide you are following is up to date and that the custom ROM you are flashing is specifically for your phone. If you do your research, you won't have to worry about bricking your smartphone.
Security Risks: Rooting presents some security risks. Depending on the services or apps you use on your device, this could create a security hole. And I have seen malicious elements that play a big role in data protection, the combination of malicious and invented launchers and made available from devices inaccessible through the annoying web.
Disabled apps: a few apps and services: Security-conscious doesn't work on rooted devices - financial platforms like Google Pay and Barclays Mobile Banking don't support them. Popular apps for human rights-protected TV works and movies, like Sky Go and Virgin TV Anywhere, won't start on rooted devices either - and neither will Netflix.
How to prepare your Android device for rooting
One of the easiest ways to root an Android device is through an app, and several rooting apps have received attention over the years - Framaroot, Firmware.mobi, Kingo Root, BaiduRoot, One Click Root, SuperSU, and Root Master are among the most reliable. 
Typically, these services root your device during the time you spend brushing your teeth. But some of them only support devices running older versions of Android, so you might need to do some research to find a device that works with your device. If you are looking to root an older device, you may need to check out Firmware. Mobi.
Previously, root Android versions of Android 7.0 Nougat was more difficult. The certified startup service will check the integrity of the device's encryption to detect if your device's system files have been compromised, preventing legitimate root applications. Thankfully, I faced the curve root apps and it became much easier to root newer versions of Android than before.
If your phone is not compatible with the one-click rooting app, then you need to spend some time looking for alternatives in Android forums. A great place to start is the XDA Developers Forum. Look for a thread on your phone or tablet and you'll likely find a way.
Preparing for rooting
Back up anything you can't live without before you start. You should always back up your current ROM to your phone before flashing a new one. You'll also need to make sure your device is fully charged before you begin.
You will need to turn on USB Debugging and OEM Unlocking. Do this by opening Settings on your device. If you do not see Developer Options toward the bottom of the Settings screen, follow these steps to activate it.
Tap on About Phone and find the Build Number. The exact path depends on your phone, but it’ll usually be found with other software information.
Tap on the Build Number seven times, and the Developer Options will appear on the Settings main page. You may need to confirm your security passcode to enable this.
Tap on the Back key to see your new developer options.
Tap Developer Options.
Check to enable USB Debugging.
Check to enable OEM Unlocking.
Installing the Android SDK Platform Tools
Previously rooting included downloading the entire Android SDK from Google. Thankfully, this is no longer the case, and all you need is the Android SDK platform tools.
Download and install the Android SDK Platform Tools from Google's developer site. There are options for Windows, Mac, and Linux systems. These are instructions for Windows devices. Extract zip files. When asked to select the directory where you want to install the program, we recommend that you set it to C: android-SDK. If you've chosen a different site, be sure to remember this.
Installing device drivers
To ensure that your computer can properly communicate with your smartphone or tablet, you will need to install the correct USB driver.
Devices from some manufacturers come with drivers included in the phone software, so all you need to do to install the correct USB driver is to connect your phone to your computer with a USB cable. OnePlus is an example, but it's worth connecting your phone first to see if the USB drivers will be installed automatically.
Other than that, here is a list of the most popular manufacturers' drivers:
Asus
Acer
Alcatel
Coolpad
Google / Nexus / Pixel
HTC
Huawei / Honor
Lenovo / Motorola
LG
Samsung
Sony
Xiaomi
Follow the installer’s instructions. Once the drivers are installed, proceed to the next step.
Unlock your bootloader
Before you begin, you need to unlock your device's bootloader. Bootloader, in simple terms, is the program that loads a device's operating system. Identifies the apps that run during the booting process of your phone or tablet.
Some manufacturers require you to have a key to unlock the bootloader. Motorola, HTC, LG, and Sony provide step-by-step instructions on how to do this, but a word of caution: it requires you to sign up for a developer account.
Unfortunately for Huawei and Honor device users, it is no longer possible to unlock the boot chargers on these phones. Huawei revoked the ability to request unlock codes in July 2018. If you still want to root a Huawei or Honor device, you need to use a third-party service like DC-Unlocker.
Once you follow these steps, you can start the unlocking process. You will need to put your device in fast boot mode. It's different for each phone, but on most devices, restarting the device and holding the Power and Volume Down buttons for 10 seconds does the trick (HTC phones require you to press the Volume Down button and press the Power button to select it).
Once Fastboot starts up, head to the folder where you previously unzipped the Android SDK files. Next, open the command prompt on your computer by pressing Shift + right-click and choosing Open Command Prompt here. If your device requires a passcode, you'll get a long string of characters. Paste it in the box on the manufacturer's website for your device, then submit the form and wait for an email with a key, file, and additional instructions.
Unlock the bootloader of your device by connecting it to your computer and returning it to Fastboot Mode. Open a command prompt by typing cmd into the start menu.
For Google Nexus and Pixel devices, the commands are easy:
Nexus phones: Type “fast-boot OEM unlock” (without quotes) and hit Enter.
Pixel phones: Type “fast-boot flashing unlock” (without quotes) and hit Enter.
It’s the same for Samsung devices:
Samsung phones: Type “fast-boot flashing unlock” (without quotes) and hit Enter.
Motorola’s command is a little different:
Type “OEM unlock UNIQUE_KEY” (without quotes), replacing “UNIQUE KEY” with the code you received
So is HTC’s:
Type “unlock token Unlock_code.bin” (without quotes), replacing “Unlock_code.bin” with the file you received.
Confirm the unlock, and you’re one step closer to rooting your Android device.
Some manufacturers and carriers don’t sanction bootloader unlocking, but that doesn’t mean it can’t be done. Try searching the XDA Developers forum for workarounds and unofficial solutions.
How to root Android phones and tablets and unroot them How to root Android phones, HOWTO, one click root, root Android phone, root android phones, root my android, root my device, root my phone, rooting definition, unroot android phone, What is rooting via exercisesfatburnig.blogspot.com https://ift.tt/3mJ1MWf
0 notes
globalmediacampaign · 4 years ago
Text
Creating Amazon Timestream interpolated views using Amazon Kinesis Data Analytics for Apache Flink
Many organizations have accelerated their adoption of stream data processing technologies in an effort to more quickly derive actionable insights from their data. Frequently, it is required that data from streams be computed into metrics or aggregations and stored in near real-time for analysis. These computed values should be generated and stored as quickly as possible; however, in instances where late arriving data is in the stream, the values must be recomputed and the original records updated. To accommodate this scenario, Amazon Timestream now supports upsert operations, meaning records are inserted into a table if they don’t already exist, or updated if they do. The default write behavior of Timestream follows the first writer wins semantics, wherein data is stored as append only and any duplicate records are rejected. However, in some applications, last writer wins semantics or the update of existing records are required. This post is part of a series demonstrating a variety of techniques for collecting, aggregating, and streaming data into Timestream across a variety of use cases. In this post, we demonstrate how to use the new upsert capability in Timestream to deal with late arriving data. For our example use case, we ingest streaming data, perform aggregations on the data stream, write records to Timestream, and handle late arriving data by updating any existing partially computed aggregates. We will also demonstrate how to use Amazon QuickSight for dashboarding and visualizations. Solution overview Time series is a common data format that describes how things change over time. Some of the most common sources of time series data are industrial machines and internet of things (IoT) devices, IT infrastructure stacks (such as hardware, software, and networking components), and applications that share their results over time. Timestream makes it easy to ingest, store, and analyze time series data at any scale. One common application of time series data is IoT data, where sensors may emit data points at a very high frequency. IoT sensors can often introduce noise into the data source, which may obfuscate trends. You may be pushing metrics at second or sub-second intervals, but want to query data at a coarser granularity to smooth out the noise. This is often accomplished by creating aggregations, averages, or interpolations over a longer period of time to smooth out and minimize the impact of noisy blips in the data. This can present a challenge, because performing interpolations and aggregations at read time can often increase the amount of computation necessary to complete a query. To solve this problem, we show you how to build a streaming data pipeline that generates aggregations when writing source data into Timestream. This enables more performant queries, because Timestream no longer has to calculate these values at runtime. The following diagram illustrates our solution’s architecture. In this post, we use synthetic Amazon Elastic Compute Cloud (Amazon EC2) instance data generated by a Python script. The data is written from an EC2 instance to an Amazon Kinesis Data Streams stream. Next, a Flink application (running within Amazon Kinesis Data Analytics for Apache Flink) reads the records from the data stream and writes them to Timestream. Inside the Flink application is where the magic of the architecture really happens. We then query and analyze the Timestream data using QuickSight. Prerequisites This post assumes the following prerequisites: QuickSight is set up within your account. If QuickSight is not yet set up within your account, refer to Getting Started with Data Analysis in Amazon QuickSight for a comprehensive walkthrough. You have an Amazon EC2 key pair. For information on creating an EC2 key pair, see Amazon EC2 key pairs and Linux instances. Setting up your resources To get started with this architecture, complete the following steps: Note: This solution may incur costs; please check the pricing pages related to the services we’re using. Run the following AWS CloudFormation template in your AWS account: For Stack name¸ enter a name for your stack. For VPC, enter a VPC for your EC2 instance. For Subnet, enter a subnet in which to launch your instance. For KeyName, choose an EC2 key pair that may be used to connect to the instance. Leave all other parameters at the default value and create the stack. The template starts by setting up the necessary AWS Identity and Access Management (IAM) policies and roles to ensure a secure environment. It then sets up an EC2 instance and installs the necessary dependencies (Maven, Flink, and code resources) onto the instance. We also set up a Kinesis data stream and a Kinesis Data Analytics application. Later in this post, you build the Flink application and deploy it to the Kinesis Data Analytics application. The CloudFormation template also deploys the Timestream database and its corresponding Timestream table. QuickSight is not deployed via CloudFormation; we configure it manually in a later step. The entire process of creating the infrastructure takes approximately 5 minutes. After the CloudFormation template is deployed, we have an EC2 instance, Kinesis data stream, empty Kinesis Data Analytics application, Timestream database, and Timestream table. In the following steps, we go through setting up, compiling, and deploying the Flink application from the EC2 instance to Kinesis Data Analytics, starting the Kinesis Data Analytics application, streaming data to the Kinesis data stream, and reading the data from Timestream via interactive queries and QuickSight. Throughout this guide, we refer to a few values contained in the Outputs section of the CloudFormation template, including how to connect to the instance, as well as the Amazon Simple Storage Service (Amazon S3) bucket used. Building the Flink application Let’s begin by connecting to the instance. On the Outputs tab of the CloudFormation template, choose the link associated with ConnectToInstance. This opens a browser-based terminal session to the instance.The EC2 instance has undergone some initial configuration. Specifically, the CloudFormation template downloads and installs Java, Maven, Flink, and clones the amazon-timestream-tools repository from GitHub. The GitHub repo is a set of tools to help you ingest data and consume data from Timestream. We use the Flink connector included in this repository as the starting point for our application. Navigate to the correct directory, using the following command: sudo su - ec2-user cd /home/ec2-user/amazon-timestream-tools/integrations/flink_connector_with_upserts Examine the contents of the main class of the Flink job using the following command: cat src/main/java/com/amazonaws/services/kinesisanalytics/StreamingJob.java This code reads in the input parameters and sets up the environment. We set up the Kinesis consumer configuration, configure the Kinesis Data Streams source, and read records from the source into the input object, which contain non-aggregated records. To produce the aggregated output, the code filters the records to only those where the measure value type is numeric. Next, timestamps and watermarks are assigned to allow for Flink’s event time processing. Event time processing allows us to operate on an event’s actual timestamp, as opposed to system time or ingestion time. For more information about event time, see Tracking Events in Kinesis Data Analytics for Apache Flink Using the DataStream API. The keyBy operation then groups records by the appropriate fields—much like the SQL GROUP BY statement. For this dataset, we aggregate by all dimensions (such as instance_name, process_name, and jdk_version) for a given measure name (such as disk_io_writes or cpu_idle). The aggregation window and the allowed lateness of data within our stream is then set before finally applying a custom averaging function. This code generates average values for each key, as defined in the keyBy function, which is written to a Timestream table at the end of every window (with a default window duration of 5 minutes). If data arrives after the window has already passed, the allowedLateness method allows us to keep that previous window in state for the duration of the window plus the duration of allowed lateness—for example, a 5-minute window plus 2 minutes of allowed lateness. When data arrives late but within the allowed lateness, the aggregate value is recomputed to include the newly added data. The previously computed aggregate stored within Timestream must then be updated.To write data from both the non-aggregated and aggregated streams to Timestream, we use a TimestreamSink. To see how data is written and upserted within Timestream, examine the TimestreamSink class using to following command: cat src/main/java/com/amazonaws/services/timestream/TimestreamSink.java Towards the bottom of the file, you can find the invoke method (also provided below). Within this method, records from the data stream are buffered and written to Timestream in batch to optimize the cost of write operations. The primary thing of note is the use of the withVersion method when constructing the record to be written to Timestream. Timestream stores the record with the highest version. When you set the version to the current timestamp and include the version in the record definition, any existing version of a given record within Timestream is updated with the most recent data. For more information about inserting and upserting data within Timestream, see Write data (inserts and upserts). @Override public void invoke(TimestreamPoint value, Context context) throws Exception { List dimensions = new ArrayList<>(); for(Map.Entry entry : value.getDimensions().entrySet()) { Dimension dim = new Dimension().withName(entry.getKey()).withValue(entry.getValue()); dimensions.add(dim); } //set vesion to current time long version = System.currentTimeMillis(); Record measure = new Record() .withDimensions(dimensions) .withMeasureName(value.getMeasureName()) .withMeasureValueType(value.getMeasureValueType()) .withMeasureValue(value.getMeasureValue()) .withTimeUnit(value.getTimeUnit()) .withTime(String.valueOf(value.getTime())) //by setting the version to the current time, latest record will overwrite any existing earlier records .withVersion(version); bufferedRecords.add(measure); if(shouldPublish()) { WriteRecordsRequest writeRecordsRequest = new WriteRecordsRequest() .withDatabaseName(this.db) .withTableName(this.table) .withRecords(bufferedRecords); try { WriteRecordsResult writeRecordsResult = this.writeClient.writeRecords(writeRecordsRequest); LOG.debug("writeRecords Status: " + writeRecordsResult.getSdkHttpMetadata().getHttpStatusCode()); bufferedRecords.clear(); emptyListTimetamp = System.currentTimeMillis(); } catch (RejectedRecordsException e){ List rejectedRecords = e.getRejectedRecords(); LOG.warn("Rejected Records -> " + rejectedRecords.size()); for (int i = rejectedRecords.size()-1 ; i >= 0 ; i-- ) { LOG.warn("Discarding Malformed Record ->" + rejectedRecords.get(i).toString()); LOG.warn("Rejected Record Reason ->" + rejectedRecords.get(i).getReason()); bufferedRecords.remove(rejectedRecords.get(i).getRecordIndex()); } } catch (Exception e) { LOG.error("Error: " + e); } } } Now that we have examined the code, we can proceed with compiling and packaging for deployment to our Kinesis Data Analytics application. Enter the following commands to create a JAR file we will deploy to our Flink application: mvn clean compile -Dflink.version=1.11.2 mvn package -Dflink.version=1.11.2 Deploying, configuring, and running the application Now that the application is packaged, we can deploy it. Copy it to the S3 bucket created as part of the CloudFormation template (substitute with the OutputBucketName from the CloudFormation stack outputs): aws s3 cp /home/ec2-user/amazon-timestream-tools/integrations/flink_connector_with_upserts/target/timestreamsink-1.0-SNAPSHOT.jar s3:///timestreamsink/timestreamsink-1.0-SNAPSHOT.jar We can now configure the Kinesis Data Analytics application. On the Kinesis console, choose Analytics applications. You should see the Kinesis Data Analytics application created via the CloudFormation template. Choose the application and choose Configure. We now set the code location for the Flink application. For Amazon S3 bucket, choose the bucket created by the CloudFormation template. For Path to Amazon S3 object, enter timestreamsink/timestreamsink-1.0-SNAPSHOT.jar. Under Properties, expand the key-value pairs associated with FlinkApplicationProperties. The Kinesis data stream, Timestream database, and table parameters for your Flink application have been prepopulated by the CloudFormation template. Choose Update. With the code location set, we can now run the Kinesis Data Analytics application. Choose Run. Choose Run without snapshot. The application takes a few moments to start, but once it has started, we can see the application graph on the console. Now that the application is running, we can start pushing data to the Kinesis data stream. Generating and sending data To generate synthetic data to populate the Timestream table, you utilize a script from Amazon Timestream Tools. This Git repository contains sample applications, plugins, notebooks, data connectors, and adapters to help you get started with Timestream and enable you to use Timestream with other tools and services. The Timestream Tools repository has already been cloned to the EC2 instance. From your EC2 instance, navigate to the Timestream Tools Kinesis ingestor directory: cd /home/ec2-user/amazon-timestream-tools/tools/kinesis_ingestor The timestream_kinesis_data_gen.py script generates a continuous stream of EC2 instance data and sends this data as records to the Kinesis data stream. Note the percent-late and late-time parameters—these send 5% of all records 75 seconds late, leading some aggregate values to be recomputed and upserted within Timestream: python3 timestream_kinesis_data_gen.py --percent-late 5 --late-time 75 --stream --region > writer.log & The Flink application starts to continuously read records from the Kinesis data stream and write them to your Timestream table. Non-aggregated records are written to Timestream immediately. Aggregated records are processed and written to Timestream every 5 minutes, with aggregates recomputed and upserted when late arriving data is generated by the Python script. Querying and visualizing your data We can now visualize the data coming in and explore it via the Timestream console. On the Timestream console, choose Query editor. For Database, choose your database. Run a quick query to verify we’re pushing both real-time and aggregated metrics: SELECT * FROM "InterpolatedBlogDB-"."EC2MetricTable-" WHERE measure_name IN ('cpu_idle', 'avg_cpu_idle') LIMIT 100 The following screenshot shows our output. In addition to simply querying the data, you can use QuickSight to analyze and publish data dashboards that contain your Timestream data. First, we need to ensure QuickSight has access to Timestream. Navigate to the QuickSight console. Choose your user name on the application bar and ensure you’re in the same Region as your Timestream database. Choose Manage QuickSight. Choose Security & permissions. Ensure that Timestream is listed under QuickSight access to AWS services. If Timestream is not listed, choose Add or remove to add Timestream. After you validate that QuickSight is configured to access Timestream, navigate to Datasets. Choose New dataset. Select Timestream. For Data source name, enter the Timestream database that was created as part of the CloudFormation template. Choose Create data source. For Database, choose the database created as part of the CloudFormation template. For Tables, select the table created as part of the CloudFormation template. Choose Select. In the following window, choose Visualize. When your data has loaded, choose Line chart under Visual types. Drag the time field to the X axis For Aggregate, choose Minute. For Value, choose measure_value::double. For Aggregate, select Average. For Color, choose measure_name. Because our Timestream data is structured as a narrow table, we need to apply filters to the dataset to select the measures of interest. On the navigation pane, choose Filter. Choose Create one. Choose measure_name. Choose the newly created filter and select avg_cpu_system and cpu_system. Choose Apply. The filter is now reflected in the visualization. Conclusion In this post, we demonstrated how to generate aggregations of streaming data, write streaming data and aggregations to Timestream, and generate visualizations of time series data using QuickSight. Through the use of Kinesis Data Streams and Kinesis Data Analytics, we deployed a data pipeline that ingests source data, and consumes this data into a Flink application that continuously reads and processes the streaming data and writes the raw and aggregated data to Timestream. We aggregated the data stream as it’s written to Timestream to reduce the amount of computation required when querying the data. With QuickSight, we rapidly developed visualizations from data stored in Timestream. We invite you to try this solution for your own use cases and to read the following posts, which contain further information and resources: What Is Amazon Kinesis Data Analytics for Apache Flink? Build and run streaming applications with Apache Flink and Amazon Kinesis Data Analytics for Java Applications Amazon Timestream Developer Guide: Amazon Kinesis Data Analytics for Apache Flink Amazon Timestream Developer Guide: Amazon QuickSight Amazon Timestream Tools and Samples Amazon Kinesis Analytics Taxi Consumer This post is part of a series describing techniques for collecting, aggregating, and streaming data to Timestream across a variety of use cases. This post focuses on challenges associated with late arriving data, partial aggregates, and upserts into Timestream. Stay tuned for the next post in the series where we focus on Grafana integration and a Kotlin based connector for Timestream. About the Authors Will Taff is a Data Lab Solutions Architect at AWS based in Anchorage, Alaska. Will helps customers design and build data, analytics, and machine learning solutions to meet their business needs. As part of the AWS Data Lab, he works with customers to rapidly develop and deploy scalable prototypes through joint engineering engagements.   John Gray is a Data Lab Solutions Architect at AWS based out of Seattle. In this role, John works with customers on their Analytics, Database and Machine Learning use cases, architects a solution to solve their business problems and helps them build a scalable prototype. https://aws.amazon.com/blogs/database/creating-amazon-timestream-interpolated-views-using-amazon-kinesis-data-analytics-for-apache-flink/
0 notes
linuxgamenews · 3 years ago
Text
Soulstone Survivors uncover new gifts in the roguelite
Tumblr media
Soulstone Survivors action roguelite game gets festive gifts on Linux, Mac, and Windows PC. Which is the result of the work from developer Game Smithing Limited. Available via Steam Early Access with 94% Very Positive reviews. ‘Tis the season for mowing down hordes of minions and monsters in this year’s most enthralling bullet heaven game. Soulstone Survivors entered Early Access with overwhelming praise. Now close out the year with hefty discounts (10% and 15% respectively) and big content updates. All due to coincide with the Steam Winter Sale on December 22nd. Void Hunters and Lovecraftian Heroes rejoice; the Horde Survival Holiday is upon us. Kicking off the holiday season, the Void Hunters of Soulstone Survivors are ready to receive a host of festive gifts. Including new weapons, skills, and hidden secrets for players to unwrap. Eight of its classes are due to receive a brand new weapon so you can shake up their existing playstyle. Bringing the total number of equipable weapons to 28 across all playable characters. 16 skills are also gearing up to be added, alongside 3 unique seasonal skills. All festive gifts are available to unlock for a limited time. Due to offer a splash of deadly holiday cheer.
Soulstone Survivors - Early Access Trailer
youtube
Eagle eyed Void Hunters may notice runes matching the colors of each Soulstone. These also have an imprint on the ground of The Frozen Wastelands. Discovering what ancient sacrificial ritual you can perform can be a test. But who knows what sort of secrets you may reveal if activating all five runes in a single snowy run. There may also be a brand new Lord of the Void lurking behind a secret portal. Soulstone Survivors is an action roguelite game where you slay hordes of foes. Then face titanic bosses while learning powerful skills to enhance your character. Play as a Void Hunter and with the spoils of every match craft weapons. All while you unlock new characters, upgrade your skill tree, and equip new runes. All in your quest for godlike powers. Soulstone Survivors is available via Steam Early Access and worth playing. The base game is priced at $9.99 USD / £8.99 / 9,99€. Along with support for Linux, Mac, and Windows PC.
0 notes
siva3155 · 6 years ago
Text
JAVA Interview Questions and Answers
java interview questions for freshers experienced developers
1. What is Java? Java is a object-oriented programming language originally developed by Sun Micro systems and released in 1995. Java runs on a variety of platforms, such as Windows, Mac OS, and the various versions of UNIX. 2. What are the supported platforms by Java Programming Language? Java runs on a variety of platforms, such as Windows, Mac OS, and the various versions of UNIX/Linux like HP-Unix, Sun Solaris, Red hat Linux, Ubuntu, Cent OS, etc. 3. List any five features of Java? Some features include Object Oriented Platform Independent Robust Interpreted Multi-threaded 4. Why is Java Architectural Neutral? It’s compiler generates an architecture-neutral object file format, which makes the compiled code to be executable on many processors, with the presence of Java runtime system. 5. What is a singleton class? Give a practical example of its usage. A singleton class in java can have only one instance and hence all its methods and variables belong to just one instance. Singleton class concept is useful for the situations when there is a need to limit the number of objects for a class. The best example of singleton usage scenario is when there is a limit of having only one connection to a database due to some driver limitations or because of any licensing issues. 6. What are the access modifiers in Java? There are 3 access modifiers. Public, protected and private, and the default one if no identifier is specified is called friendly, but programmer cannot specify the friendly identifier explicitly. 7. What is are packages? A package is a collection of related classes and interfaces providing access protection and namespace management. 8. What is meant by Inheritance and What are its advantages? Inheritance is the process of inheriting all the features from a class. The advantages of inheritance are reusability of code and accessibility of variables and methods of the super class by subclasses. 9. What is the difference between superclass and subclass? A super class is a class that is inherited whereas sub class is a class that does the inheriting. 10. What is an abstract class? An abstract class is a class designed with implementation gaps for subclasses to fill in and is deliberately incomplete.
Tumblr media
JAVA Interview Questions 11. What are the states associated in the thread? Thread contains ready, running, waiting and dead states. 12. What is synchronization? Synchronization is the mechanism that ensures that only one thread is accessed the resources at a time. 13. What is deadlock? When two threads are waiting each other and can’t precede the program is said to be deadlock. 14. What is an applet? Applet is a dynamic and interactive program that runs inside a web page displayed by a java capable browser 15. What is the lifecycle of an applet? init() method - Can be called when an applet is first loaded start() method - Can be called each time an applet is started. paint() method - Can be called when the applet is minimized or maximized. stop() method - Can be used when the browser moves off the applet’s page. destroy() method - Can be called when the browser is finished with the applet. 16. Define How do you set security in applets? using setSecurityManager() method 17. What is a layout manager and What are different types of layout managers available in java AWT? A layout manager is an object that is used to organize components in a container. The different layouts are available are FlowLayout, BorderLayout, CardLayout, GridLayout and GridBagLayout 18. What is JDBC? JDBC is a set of Java API for executing SQL statements. This API consists of a set of classes and interfaces to enable programs to write pure Java Database applications. 19. What are drivers available? JDBC-ODBC Bridge driver Native API Partly-Java driver JDBC-Net Pure Java driver Native-Protocol Pure Java driver 20. What is stored procedure? Stored procedure is a group of SQL statements that forms a logical unit and performs a particular task. Stored Procedures are used to encapsulate a set of operations or queries to execute on database. Stored procedures can be compiled and executed with different parameters and results and may have any combination of input/output parameters. 21. What is the Java API? The Java API is a large collection of ready-made software components that provide many useful capabilities, such as graphical user interface (GUI) widgets. 22. Why there are no global variables in Java? Global variables are globally accessible. Java does not support globally accessible variables due to following reasons: The global variables breaks the referential transparency Global variables creates collisions in namespace. 23. What are Encapsulation, Inheritance and Polymorphism? Encapsulation is the mechanism that binds together code and data it manipulates and keeps both safe from outside interference and misuse. Inheritance is the process by which one object acquires the properties of another object. Polymorphism is the feature that allows one interface to be used for general class actions. 24. What is the use of bin and lib in JDK? Bin contains all tools such as javac, appletviewer, awt tool, etc., whereas lib contains API and all packages. 25. What is method overloading and method overriding? Method overloading: When a method in a class having the same method name with different arguments is said to be method overloading. Method overriding : When a method in a class having the same method name with same arguments is said to be method overriding. 26. What is the difference between this() and super()? this() can be used to invoke a constructor of the same class whereas super() can be used to invoke a super class constructor. 27. What is Domain Naming Service(DNS)? It is very difficult to remember a set of numbers(IP address) to connect to the Internet. The Domain Naming Service(DNS) is used to overcome this problem. It maps one particular IP address to a string of characters. For example, www. mascom. com implies com is the domain name reserved for US commercial sites, moscom is the name of the company and www is the name of the specific computer, which is mascom’s server. 28. What is URL? URL stands for Uniform Resource Locator and it points to resource files on the Internet. URL has four components: http://www. address. com:80/index.html, where http - protocol name, address - IP address or host name, 80 - port number and index.html - file path. 29. What is RMI and steps involved in developing an RMI object? Remote Method Invocation (RMI) allows java object that executes on one machine and to invoke the method of a Java object to execute on another machine. The steps involved in developing an RMI object are: a) Define the interfaces b) Implementing these interfaces c) Compile the interfaces and their implementations with the java compiler d) Compile the server implementation with RMI compiler e) Run the RMI registry f) Run the application. 30. What is RMI architecture? RMI architecture consists of four layers and each layer performs specific functions: a) Application layer - contains the actual object definition. b) Proxy layer - consists of stub and skeleton. c) Remote Reference layer - gets the stream of bytes from the transport layer and sends it to the proxy layer. d) Transportation layer - responsible for handling the actual machine-to-machine communication. 31. What is a Java Bean? A Java Bean is a software component that has been designed to be reusable in a variety of different environments. 32. What are checked exceptions? Checked exception are those which the Java compiler forces you to catch. e.g. IOException are checked Exceptions. 33. What are runtime exceptions? Runtime exceptions are those exceptions that are thrown at runtime because of either wrong input data or because of wrong business logic etc. These are not checked by the compiler at compile time. 34. What is the difference between error and an exception? An error is an irrecoverable condition occurring at runtime. Such as OutOfMemory error. These JVM errors and you can not repair them at runtime. While exceptions are conditions that occur because of bad input etc. e.g. FileNotFoundException will be thrown if the specified file does not exist. Or a NullPointerException will take place if you try using a null reference. In most of the cases it is possible to recover from an exception (probably by giving user a feedback for entering proper values etc.). 35. What is the purpose of finalization? The purpose of finalization is to give an unreachable object the opportunity to perform any cleanup processing before the object is garbage collected. For example, closing a opened file, closing a opened database Connection. 36. What is the difference between yielding and sleeping? When a task invokes its yield() method, it returns to the ready state. When a task invokes its sleep() method, it returns to the waiting state. 37. What is the difference between preemptive scheduling and time slicing? Under preemptive scheduling, the highest priority task executes until it enters the waiting or dead states or a higher priority task comes into existence. Under time slicing, a task executes for a predefined slice of time and then reenters the pool of ready tasks. The scheduler then determines which task should execute next, based on priority and other factors. 38. What is mutable object and immutable object? If a object value is changeable then we can call it as Mutable object. (Ex., StringBuffer, …) If you are not allowed to change the value of an object, it is immutable object. (Ex., String, Integer, Float, …) 39. What is the purpose of Void class? The Void class is an uninstantiable placeholder class to hold a reference to the Class object representing the primitive Java type void. 40. What is JIT and its use? Really, just a very fast compiler… In this incarnation, pretty much a one-pass compiler — no offline computations. So you can’t look at the whole method, rank the expressions according to which ones are re-used the most, and then generate code. In theory terms, it’s an on-line problem. 41. What is nested class? If all the methods of a inner class is static then it is a nested class. 42. What is HashMap and Map? Map is Interface and Hashmap is class that implements that. 43. What are different types of access modifiers? public: Any thing declared as public can be accessed from anywhere. private: Any thing declared as private can’t be seen outside of its class. protected: Any thing declared as protected can be accessed by classes in the same package and subclasses in the other packages. default modifier : Can be accessed only to classes in the same package. 44. What is the difference between Reader/Writer and InputStream/Output Stream? The Reader/Writer class is character-oriented and the InputStream/OutputStream class is byte-oriented. 45. What is servlet? Servlets are modules that extend request/response-oriented servers, such as java-enabled web servers. For example, a servlet might be responsible for taking data in an HTML order-entry form and applying the business logic used to update a company’s order database. 46. What is Constructor? A constructor is a special method whose task is to initialize the object of its class. It is special because its name is the same as the class name. They do not have return types, not even void and therefore they cannot return values. They cannot be inherited, though a derived class can call the base class constructor. Constructor is invoked whenever an object of its associated class is created. 47. What is an Iterator ? The Iterator interface is used to step through the elements of a Collection. Iterators let you process each element of a Collection. Iterators are a generic way to go through all the elements of a Collection no matter Define How it is organized. Iterator is an Interface implemented a different way for every Collection. 48. What is the List interface? The List interface provides support for ordered collections of objects. Lists may contain duplicate elements. 49. What is memory leak? A memory leak is where an unreferenced object that will never be used again still hangs around in memory and doesnt get garbage collected. 50. What is the difference between the prefix and postfix forms of the ++ operator? The prefix form performs the increment operation and returns the value of the increment operation. The postfix form returns the current value all of the expression and then performs the increment operation on that value. 51. What is the difference between a constructor and a method? A constructor is a member function of a class that is used to create objects of that class. It has the same name as the class itself, has no return type, and is invoked using the new operator. A method is an ordinary member function of a class. It has its own name, a return type (which may be void), and is invoked using the dot operator. 52. What will happen to the Exception object after exception handling? Exception object will be garbage collected. 53. Difference between static and dynamic class loading. Static class loading: The process of loading a class using new operator is called static class loading. Dynamic class loading: The process of loading a class at runtime is called dynamic class loading. Dynamic class loading can be done by using Class.forName(….).newInstance(). 54. Explain the Common use of EJB The EJBs can be used to incorporate business logic in a web-centric application. The EJBs can be used to integrate business processes in Business-to-business (B2B) e-commerce applications.In Enterprise Application Integration applications, EJBs can be used to house processing and mapping between different applications. 55. What is JSP? JSP is a technology that returns dynamic content to the Web client using HTML, XML and JAVA elements. JSP page looks like a HTML page but is a servlet. It contains Presentation logic and business logic of a web application. 56. What is the purpose of apache tomcat? Apache server is a standalone server that is used to test servlets and create JSP pages. It is free and open source that is integrated in the Apache web server. It is fast, reliable server to configure the applications but it is hard to install. It is a servlet container that includes tools to configure and manage the server to run the applications. It can also be configured by editing XML configuration files. 57. Where pragma is used? Pragma is used inside the servlets in the header with a certain value. The value is of no-cache that tells that a servlets is acting as a proxy and it has to forward request. Pragma directives allow the compiler to use machine and operating system features while keeping the overall functionality with the Java language. These are different for different compilers. 58. Briefly explain daemon thread. Daemon thread is a low priority thread which runs in the background performs garbage collection operation for the java runtime system. 59. What is a native method? A native method is a method that is implemented in a language other than Java. 60. Explain different way of using thread? A Java thread could be implemented by using Runnable interface or by extending the Thread class. The Runnable is more advantageous, when you are going for multiple inheritance. 61. What are the two major components of JDBC? One implementation interface for database manufacturers, the other implementation interface for application and applet writers. 62. What kind of thread is the Garbage collector thread? It is a daemon thread. 63. What are the different ways to handle exceptions? There are two ways to handle exceptions, By wrapping the desired code in a try block followed by a catch block to catch the exceptions. and List the desired exceptions in the throws clause of the method and let the caller of the method handle those exceptions. 64. Define How many objects are created in the following piece of code? MyClass c1, c2, c3; c1 = new MyClass (); c3 = new MyClass (); Answer: Only 2 objects are created, c1 and c3. The reference c2 is only declared and not initialized. 65.What is UNICODE? Unicode is used for internal representation of characters and strings and it uses 16 bits to represent each other. 66. Can a constructor have different name than a Class name in Java? Constructor in Java must have same name as the class name and if the name is different, it doesn’t act as a constructor and compiler thinks of it as a normal method. 67. What will be the output of Round(3.7) and Ceil(3.7)? Round(3.7) returns 4 and Ceil(3.7) returns 4. 68: Can we use goto in Java to go to a particular line? In Java, there is not goto keyword and java doesn’t support this feature of going to a particular labeled line. 69. Can a dead thread be started again? In java, a thread which is in dead state can’t be started again. There is no way to restart a dead thread. 70. Is the following class declaration correct? public abstract final class testClass { // Class methods and variables } The above class declaration is incorrect as an abstract class can’t be declared as Final. 71. Is JDK required on each machine to run a Java program? JDK is development Kit of Java and is required for development only and to run a Java program on a machine, JDK isn’t required. Only JRE is required. 72. Which object oriented Concept is achieved by using overloading and overriding? Polymorphism 73. Is it possible to define a method in Java class but provide it’s implementation in the code of another language like C? Yes, we can do this by use of native methods. In case of native method based development, we define public static methods in our Java class without its implementation and then implementation is done in another language like C separately. 74. Define How destructors are defined in Java? In Java, there are no destructors defined in the class as there is no need to do so. Java has its own garbage collection mechanism which does the job automatically by destroying the objects when no longer referenced. 75. Can a variable be local and static at the same time? No a variable can’t be static as well as local at the same time. Defining a local variable as static gives compilation error. 76. Can we have static methods in an Interface? Static methods can’t be overridden in any class while any methods in an interface are by default abstract and are supposed to be implemented in the classes being implementing the interface. So it makes no sense to have static methods in an interface in Java. 77. In a class implementing an interface, can we change the value of any variable defined in the interface? No, we can’t change the value of any variable of an interface in the implementing class as all variables defined in the interface are by default public, static and Final and final variables are like constants which can’t be changed later. 78. Is it correct to say that due to garbage collection feature in Java, a java program never goes out of memory? Even though automatic garbage collection is provided by Java, it doesn’t ensure that a Java program will not go out of memory as there is a possibility that creation of Java objects is being done at a faster pace compared to garbage collection resulting in filling of all the available memory resources. So, garbage collection helps in reducing the chances of a program going out of memory but it doesn’t ensure that. 79. Can we have any other return type than void for main method? No, Java class main method can have only void return type for the program to get successfully executed. Nonetheless , if you absolutely must return a value to at the completion of main method , you can use System.exit(int status) 80. I want to re-reach and use an object once it has been garbage collected. Define How it’s possible? Once an object has been destroyed by garbage collector, it no longer exists on the heap and it can’t be accessed again. There is no way to reference it again. 81. In Java thread programming, which method is a must implementation for all threads? Run() is a method of Runnable interface that must be implemented by all threads. 82. I want to control database connections in my program and want that only one thread should be able to make database connection at a time. Define How can I implement this logic? This can be implemented by use of the concept of synchronization. Database related code can be placed in a method which hs synchronized keyword so that only one thread can access it at a time. 83. Can an Interface extend another Interface? Yes an Interface can inherit another Interface, for that matter an Interface can extend more than one Interface. 84. I want my class to be developed in such a way that no other class (even derived class) can create its objects. Define How can I do so? If we declare the constructor of a class as private, it will not be accessible by any other class and hence, no other class will be able to instantiate it and formation of its object will be limited to itself only. 85. Define How objects are stored in Java? In java, each object when created gets a memory space from a heap. When an object is destroyed by a garbage collector, the space allocated to it from the heap is re-allocated to the heap and becomes available for any new objects. 86. Define How can we find the actual size of an object on the heap? In java, there is no way to find out the exact size of an object on the heap. 87. Which of the following classes will have more memory allocated? Class Three methods, four variables, no object Class B: Five methods, three variables, no object Memory isn’t allocated before creation of objects. Since for both classes, there are no objects created so no memory is allocated on heap for any class. 88. What happens if an exception is not handled in a program? If an exception is not handled in a program using try catch blocks, program gets aborted and no statement executes after the statement which caused exception throwing. 89. I have multiple constructors defined in a class. Is it possible to call a constructor from another constructor’s body? If a class has multiple constructors, it’s possible to call one constructor from the body of another one using this(). 90. What’s meant by anonymous class? An anonymous class is a class defined without any name in a single line of code using new keyword. For example, in below code we have defined an anonymous class in one line of code: public java.util.Enumeration testMethod() { return new java.util.Enumeration() { @Override public boolean hasMoreElements() { // TODO Auto-generated method stub return false; } @Override public Object nextElement() { // TODO Auto-generated method stub return null; } 91. Is there a way to increase the size of an array after its declaration? Arrays are static and once we have specified its size, we can’t change it. If we want to use such collections where we may require a change of size ( no of items), we should prefer vector over array. 92. If an application has multiple classes in it, is it okay to have a main method in more than one class? If there is main method in more than one classes in a java application, it won’t cause any issue as entry point for any application will be a specific class and code will start from the main method of that particular class only. 93. I want to persist data of objects for later use. What’s the best approach to do so? The best way to persist data for future use is to use the concept of serialization. 94. What is a Local class in Java? In Java, if we define a new class inside a particular block, it’s called a local class. Such a class has local scope and isn’t usable outside the block where its defined. 95. String and StringBuffer both represent String objects. Can we compare String and StringBuffer in Java? Although String and StringBuffer both represent String objects, we can’t compare them with each other and if we try to compare them, we get an error. 96. Which API is provided by Java for operations on set of objects? Java provides a Collection API which provides many useful methods which can be applied on a set of objects. Some of the important classes provided by Collection API include ArrayList, HashMap, TreeSet and TreeMap. 97. Can we cast any other type to Boolean Type with type casting? No, we can neither cast any other primitive type to Boolean data type nor can cast Boolean data type to any other primitive data type. 98. What are synchronized methods and synchronized statements? Synchronized methods are methods that are used to control access to an object. A synchronized statement can only be executed after a thread has acquired the lock for the object or class referenced in the synchronized statement. 99. Define How does a try statement determine which catch clause should be used to handle an exception? When an exception is thrown within the body of a try statement, the catch clauses of the try statement are examined in the order in which they appear. The first catch clause that is capable of handling the exception is executed. The remaining catch clauses are ignored. 100. What will be the default values of all the elements of an array defined as an instance variable? If the array is an array of primitive types, then all the elements of the array will be initialized to the default value corresponding to that primitive type. Basic JAVA Questions with Answers pdf download 101. What is the difference between static and non-static variables? A static variable is associated with the class as a whole rather than with specific instances of a class. Non-static variables take on unique values with each object instance. 102. What is Serialization and deserialization? Serialization is the process of writing the state of an object to a byte stream. Deserialization is the process of restoring these objects. 103. What are use cases? It is part of the analysis of a program and describes a situation that a program might encounter and what behavior the program should exhibit in that circumstance. 104. Explain the use of sublass in a Java program? Sub class inherits all the public and protected methods and the implementation. It also inherits all the default modifier methods and their implementation. 105. How to add menushortcut to menu item? If there is a button instance called b1, you may add menu short cut by calling b1.setMnemonic('F'), so the user may be able to use Alt+F to click the button. 106. Can you write a Java class that could be used both as an applet as well as an application? Yes, just add a main() method to the applet. 107. What is the difference between Swing and AWT components? AWT components are heavy-weight, whereas Swing components are lightweight. Heavy weight components depend on the local windowing toolkit. For example, java.awt.Button is a heavy weight component, when it is running on the Java platform for Unix platform, it maps to a real Motif button. 108. What's the difference between constructors and other methods? Constructors must have the same name as the class and can not return a value. They are only called once while regular methods could be called many times. 109. Is there any limitation of using Inheritance? Yes, since inheritance inherits everything from the super class and interface, it may make the subclass too clustering and sometimes error-prone when dynamic overriding or dynamic overloading in some situation. 109. When is the ArrayStoreException thrown? When copying elements between different arrays, if the source or destination arguments are not arrays or their types are not compatible, an ArrayStoreException will be thrown. 110. Can you call one constructor from another if a class has multiple constructors? Yes, use this() syntax. 111. What's the difference between the methods sleep() and wait()? The code sleep(2000); puts thread aside for exactly two seconds. The code wait(2000), causes a wait of up to two second. A thread could stop waiting earlier if it receives the notify() or notifyAll() call. The method wait() is defined in the class Object and the method sleep() is defined in the class Thread. 112. When ArithmeticException is thrown? The ArithmeticException is thrown when integer is divided by zero or taking the remainder of a number by zero. It is never thrown in floating-point operations. 113. What is a transient variable? A transient variable is a variable that may not be serialized during Serialization and which is initialized by its default value during de-serialization, 114. What is synchronization? Synchronization is the capability to control the access of multiple threads to shared resources. synchronized keyword in java provides locking which ensures mutual exclusive access of shared resource and prevent data race. 115. What is the Collections API? The Collections API is a set of classes and interfaces that support operations on collections of objects. 116. Does garbage collection guarantee that a program will not run out of memory? Garbage collection does not guarantee that a program will not run out of memory. It is possible for programs to use up memory resources faster than they are garbage collected. It is also possible for programs to create objects that are not subject to garbage collection. 117. The immediate super class of the Applet class? Panel is the immediate super class. A panel provides space in which an application can attach any other component, including other panels. 118. Which Java operator is right associative? The = operator is right associative. 119. What is the difference between a break statement and a continue statement? A break statement results in the termination of the statement to which it applies (switch, for, do, or while). A continue statement is used to end the current loop iteration and return control to the loop statement. 120. If a variable is declared as private, where may the variable be accessed? A private variable may only be accessed within the class in which it is declared. 121. What is the purpose of the System class? The purpose of the System class is to provide access to system resources. 122. List primitive Java types? The eight primitive types are byte, char, short, int, long, float, double, and boolean. 123. What is the relationship between clipping and repainting under AWT? When a window is repainted by the AWT painting thread, it sets the clipping regions to the area of the window that requires repainting. 124. Which class is the immediate superclass of the Container class? Component class is the immediate super class. 125. What class of exceptions are generated by the Java run-time system? The Java runtime system generates RuntimeException and Error exceptions. 126. Under what conditions is an object's finalize() method invoked by the garbage collector? The garbage collector invokes an object's finalize() method when it detects that the object has become unreachable. 127. How can a dead thread be restarted? A dead thread cannot be restarted. 128. Which arithmetic operations can result in the throwing of an ArithmeticException? Integer / and % can result in the throwing of an ArithmeticException. 129. Variable of the boolean type is automatically initialized as? The default value of the boolean type is false. 130. What are ClassLoaders? A class loader is an object that is responsible for loading classes. The class ClassLoader is an abstract class. 131. What is the difference between an Interface and an Abstract class? An abstract class can have instance methods that implement a default behavior. An Interface can only declare constants and instance methods, but cannot implement default behavior and all methods are implicitly abstract. An interface has all public members and no implementation. 132. What will happen if static modifier is removed from the signature of the main method? Program throws "NoSuchMethodError" error at runtime . 133. Can try statements be nested? Yes 134. What is the default value of an object reference declared as an instance variable? Null, unless it is defined explicitly. 135. Can a top level class be private or protected? No, a top level class can not be private or protected. It can have either "public" or no modifier. 136. Why do we need wrapper classes? We can pass them around as method parameters where a method expects an object. It also provides utility methods. 137. What is the difference between error and an exception? An error is an irrecoverable condition occurring at runtime. Such as OutOfMemory error. Exceptions are conditions that occur because of bad input etc. e.g. FileNotFoundException will be thrown if the specified file does not exist. 138. Is it necessary that each try block must be followed by a catch block? It is not necessary that each try block must be followed by a catch block. It should be followed by either a catch block or a finally block. 139. When a thread is created and started, what is its initial state? A thread is in the ready state as initial state after it has been created and started. 140. What is the Locale class? The Locale class is used to tailor program output to the conventions of a particular geographic, political, or cultural region. 141. What are synchronized methods and synchronized statements? Synchronized methods are methods that are used to control access to an object. A synchronized statement can only be executed after a thread has acquired the lock for the object or class referenced in the synchronized statement. 142. What is runtime polymorphism or dynamic method dispatch? Runtime polymorphism or dynamic method dispatch is a process in which a call to an overridden method is resolved at runtime rather than at compile-time. In this process, an overridden method is called through the reference variable of a superclass. 143. What is Dynamic Binding(late binding)? Binding refers to the linking of a procedure call to the code to be executed in response to the call. Dynamic binding means that the code associated with a given procedure call is not known until the time of the call at run-time. 144. Can constructor be inherited? No, constructor cannot be inherited. 145. What are the advantages of ArrayList over arrays? ArrayList can grow dynamically and provides more powerful insertion and search mechanisms than arrays. 146. Why deletion in LinkedList is fast than ArrayList? Deletion in linked list is fast because it involves only updating the next pointer in the node before the deleted node and updating the previous pointer in the node after the deleted node. 147. How do you decide when to use ArrayList and LinkedList? If you need to frequently add and remove elements from the middle of the list and only access the list elements sequentially, then LinkedList should be used. If you need to support random access, without inserting or removing elements from any place other than the end, then ArrayList should be used. 148. What is a Values Collection View ? It is a collection returned by the values() method of the Map Interface, It contains all the objects present as values in the map. 149. What is dot operator? The dot operator(.) is used to access the instance variables and methods of class objects.It is also used to access classes and sub-packages from a package. 150. Where and how can you use a private constructor? Private constructor is used if you do not want other classes to instantiate the object and to prevent subclassing.T 151. What is type casting? Type casting means treating a variable of one type as though it is another type. Q: Describe life cycle of thread? A thread is a execution in a program. The life cycle of a thread include:Newborn state Runnable state Running state Blocked state Dead state 152. What is the difference between the >> and >>> operators? The >> operator carries the sign bit when shifting right. The >>> zero-fills bits that have been shifted out. 153. Which method of the Component class is used to set the position and size of a component? setBounds() method is used for this purpose. 154. What is the range of the short type? The range of the short type is -(2^15) to 2^15 - 1. 155. What is the immediate superclass of Menu? MenuItem class 156. Does Java allow Default Arguments? No, Java does not allow Default Arguments. 157. Which number is denoted by leading zero in java? Octal Numbers are denoted by leading zero in java, example: 06 158. Which number is denoted by leading 0x or 0X in java? Hexadecimal Numbers are denoted by leading 0x or 0X in java, example: 0XF 159. Break statement can be used as labels in Java? Yes, an example can be break one; 160. Where import statement is used in a Java program? Import statement is allowed at the beginning of the program file after package statement. 161. Explain suspend() method under Thread class> It is used to pause or temporarily stop the execution of the thread. 162. Explain isAlive() method under Thread class? It is used to find out whether a thread is still running or not. 163. What is currentThread()? It is a public static method used to obtain a reference to the current thread. 164. Explain main thread under Thread class execution? The main thread is created automatically and it begins to execute immediately when a program starts. It ia thread from which all other child threads originate. 165. Life cycle of an applet includes which steps? Life cycle involves the following steps: Initialization Starting Stopping Destroying Painting 166. Why is the role of init() method under applets? It initializes the applet and is the first method to be called. 167. Which method is called by Applet class to load an image? getImage(URL object, filename) is used for this purpose. 168. Define code as an attribute of Applet? It is used to specify the name of the applet class. 169. Define canvas? It is a simple drawing surface which are used for painting images or to perform other graphical operations. 170. Define Network Programming? It refers to writing programs that execute across multiple devices (computers), in which the devices are all connected to each other using a network. 171. What is a Socket? Sockets provide the communication mechanism between two computers using TCP. A client program creates a socket on its end of the communication and attempts to connect that socket to a server. 172. Advantages of Java Sockets? Sockets are flexible and sufficient. Efficient socket based programming can be easily implemented for general communications. It cause low network traffic. 173. Disadvantages of Java Sockets? Socket based communications allows only to send packets of raw data between applications. Both the client-side and server-side have to provide mechanisms to make the data useful in any way. 174. Which class is used by server applications to obtain a port and listen for client requests? java.net.ServerSocket class is used by server applications to obtain a port and listen for client requests 175. Which class represents the socket that both the client and server use to communicate with each other? java.net.Socket class represents the socket that both the client and server use to communicate with each other. 176. Why Generics are used in Java? Generics provide compile-time type safety that allows programmers to catch invalid types at compile time. Java Generic methods and generic classes enable programmers to specify, with a single method declaration, a set of related methods or, with a single class declaration, a set of related types. 177. What environment variables do I need to set on my machine in order to be able to run Java programs? CLASSPATH and PATH are the two variables. 178. Is there any need to import java.lang package? No, there is no need to import this package. It is by default loaded internally by the JVM. 179. What is Nested top-level class? If a class is declared within a class and specify the static modifier, the compiler treats the class just like any other top-level class. Nested top-level class is an Inner class. 180. What is Externalizable interface? Externalizable is an interface which contains two methods readExternal and writeExternal. These methods give you a control over the serialization mechanism. 181. If System.exit (0); is written at the end of the try block, will the finally block still execute? No in this case the finally block will not execute because when you say System.exit (0); the control immediately goes out of the program, and thus finally never executes. 182. What is daemon thread? Daemon thread is a low priority thread, which runs intermittently in the back ground doing the garbage collection operation for the java runtime system. 183. Which method is used to create the daemon thread? setDaemon method is used to create a daemon thread. 184. Which method must be implemented by all threads? All tasks must implement the run() method 185. What is the GregorianCalendar class? The GregorianCalendar provides support for traditional Western calendars 186. What is the SimpleTimeZone class? The SimpleTimeZone class provides support for a Gregorian calendar . 187. What is the difference between the size and capacity of a Vector? The size is the number of elements actually stored in the vector, while capacity is the maximum number of elements it can store at a given instance of time. 188. Can a vector contain heterogenous objects? Yes a Vector can contain heterogenous objects. Because a Vector stores everything in terms of Object. 189. What is an enumeration? An enumeration is an interface containing methods for accessing the underlying data structure from which the enumeration is obtained. It allows sequential access to all the elements stored in the collection. 190. What is difference between Path and Classpath? Path and Classpath are operating system level environment variales. Path is defines where the system can find the executables(.exe) files and classpath is used to specify the location of .class files. 191. Can a class declared as private be accessed outside it's package? No, it's not possible to accessed outside it's package. 192. What are the restriction imposed on a static method or a static block of code? A static method should not refer to instance variables without creating an instance and cannot use "this" operator to refer the instance. 240. Can an Interface extend another Interface? Yes an Interface can inherit another Interface, for that matter an Interface can extend more than one Interface. 241. Which object oriented Concept is achieved by using overloading and overriding? Polymorphism 242. What is an object's lock and which object's have locks? An object's lock is a mechanism that is used by multiple threads to obtain synchronized access to the object. A thread may execute a synchronized method of an object only after it has acquired the object's lock. 243. What is Downcasting? It is the casting from a general to a more specific type, i.e. casting down the hierarchy. 244. What are order of precedence and associativity and how are they used? Order of precedence determines the order in which operators are evaluated in expressions. Associatity determines whether an expression is evaluated left-to-right or right-to-left. 245. If a method is declared as protected, where may the method be accessed? A protected method may only be accessed by classes or interfaces of the same package or by subclasses of the class in which it is declared. 246. What is the difference between inner class and nested class? When a class is defined within a scope of another class, then it becomes inner class. If the access modifier of the inner class is static, then it becomes nested class. 247. What restrictions are placed on method overriding? Overridden methods must have the same name, argument list, and return type. The overriding method may not limit the access of the method it overrides. 248. What is constructor chaining and how is it achieved in Java? A child object constructor always first needs to construct its parent. In Java it is done via an implicit call to the no-args constructor as the first statement. 249. Can a double value be cast to a byte? Yes, a double value can be cast to a byte. 250. How does a try statement determine which catch clause should be used to handle an exception? When an exception is thrown within the body of a try statement, the catch clauses of the try statement are examined in the order in which they appear. The first catch clause that is capable of handling the exception is executed. The remaining catch clauses are ignored. Core Java Interview Questions JAVA Online Test Java Interview Questions for Freshers & Experienced #java interview questions for experienced #java interview questions pdf #java interview questions and answers for freshers #java interview questions geeksforgeeks #java interview questions for experienced professionals #java interview questions for 5 years experience #java interview questions and answers for freshers pdf Read the full article
0 notes
matiasqtur485-blog · 6 years ago
Text
10 Undeniable Reasons People Hate Free Amazon Gift Card
EU About Amazon Homepage
Turn your downtime into cost-free Amazon.com present cards. There are lots of offers, promo codes, and price cut that will assist you save large on 2019 vacation gifts. There will certainly likewise be deals on phones, Televisions, games consoles as well as home appliances however we have actually assembled the Black Friday deals thus far including dishwashing machines, washing equipments and TVs.
Bear in mind, lots of gift cards are multi-use and also you can keep utilizing them up until the credit is consumed. 22 - that's the Friday prior to Thanksgiving, one week prior to Black Friday correct. Use our Amazon.com discount code to avail this offer.
Tumblr media
To acquire as well as print an Amazon.com present card, you need to most likely to and click on the "Gift Cards" web link on top of the home page. Gift cards resemble cash as they can be used to get virtually anything with little constraint, and can be combined with various other offers and also coupon codes.
You spend the present card like cash, minimizing every purchase. In previous years, Apple has offered gift cards instead of cut rates, whereas shops as well as online retailers run offers as well as offers. . However I found a couple of significant non-Amazon deals also, so check those out, too.
Tumblr media
Occasionally we are sent out a link to an internet site to fetch a card which is good, however if the link calls for a kind to be finished and also an email to be obtained, we will certainly not be able to refine it, so ensure its straightforward as well as clear. Gift cards offered in quantities of $9.99 for 1 month to $59.99 for twelve month.
It has to be complete: Missing out on, void or insufficient codes will certainly result in cards being noted as invalid. A.: Amazon Prime Instant Video is available on Computers, Macs and Linux computers, along with all last-gen as well as modern-day video game gaming consoles.
Cardyard is the UK's only gift-card exchange business setup to provide you money and save you money. The recipient of the present card can retrieve the present on The equilibrium of the card will instantly be applied to his account as well as will certainly be made use of to pay for any kind of future items acquired on Amazon.
To print a present card from Amazon.com, you have to have access to a printer. In current days, Mr. de Blasio had actually attempted to get to Jeff Bezos, Amazon.com's chief executive, according to one authorities. Enter very early as well as register to its email listing to find out about the bargains as they drop (or inspect back here!).
The average annual Amazon buying expenditure of Amazon Prime members was located to be 1,400 UNITED STATE dollars on the on the internet purchasing platform every year, compared to 600 UNITED STATE bucks costs of non-Prime participants. Prime participants get special offers and coupons through Amazon.com Family, consisting of up to 20% off subscriptions to baby diapers, child food, and various other family-oriented products.
A.: Prime members save $2 monthly on this membership solution that supplies countless publications, films, TELEVISION shows, educational applications as well as games for children ages 3 to ten years old. Cardyard is the secure, secure location to amazon gift card code buy discounted gift cards, to get money for an unwanted gift card, or to trade one gift card for an additional.
You can save money at Amazon.com by utilizing among the present Amazon vouchers from Slickdeals. The AirPods sold well last year, and also Amazon.com ran a couple of offers on Apple items like the Watch. We'll likewise be adding the most effective bargains to this web page, so remember to check back in the lead up to Black Friday.
Tumblr media
0 notes
ishaikhspear-blog · 6 years ago
Text
CTF challenge: fd
File Descriptors
The first CTF challenge starts off with a big hint: file descriptors. Having a computer science background I was interested in what these challenges would be like, so I refreshed my memory on file descriptors. 
File descriptors are unique identification numbers for an open file, which can then be used to read, write and perform more complex operations. The most important fds would be linux’s default file descriptors: 0 being stdin; 1 for stdout and 2 for stderr. 
The challenge
Using the command “ssh [email protected] -p2222” I found 3 files. 
fd - a binary file, created from compiled c
fd.c - a c file
flag - txt file
The aim of the challenge being to read the flag file and enter the password to complete the challenge. Immediately I tried to cat flag but the I was denied permission. I tried to chmod the flag file but that didn’t work either. NEXT I tried to cat the fd.c file and, thankfully, my go-to strategy worked wonders. I was able to read the file:
Tumblr media
It seems the program expects an argument, type converts it to an int, subtracts 0x1234 (4660). Next the function read is called with params fd, buf and 32. 
A quick lookup of the read function returns: 
“read(int fildes, void *buf, size_t nbyte); The read() function shall attempt to read nbyte bytes from the file associated with the open file descriptor fildes, into the buffer pointed to by buf“
So the read function reads 32 bytes into buf from the file descriptor fd...which we have absolute control over. I thought that if we just made fd to be 0 we could make the program read from standard input, store what was entered from standard input into buf. After that, the program compares what’s in buf to the string “LETMEWIN” and conveniently cats the flag file for us. 
So the arg to the program is subtract with 0x1234 = 4660. We just need to enter 4660 as the argument to the function, enter “LETMEWIN” to be read from standard input and we can get the flag. 
Tumblr media
Entering the flag into pwnable gave me 1 point to my account. 
0 notes