How to view .HEIC image thumbnails in Void Linux thunar/nautilus/pcmanfm…file managers
Install these packages and restart file manager sudo xbps-install libheif libheif-tools Note: HEIC thumbnails in pcmanfm didn’t work for me.
Install these packages and restart file manager sudo xbps-install libheif libheif-tools Note: HEIC thumbnails in pcmanfm didn’t work for me.
Table 1: Recommended system swap space in Fedora 28 documentation {.wp-block-heading} Amount of system RAM Recommended swap space Recommended swap with hibernation less than 2 GB 2 times the amount of RAM 3 times the amount of RAM 2 GB – 8 GB Equal to the amount of RAM 2 times the amount of RAM 8 GB – 64 GB 0.5 times the amount of RAM 1.5 times the amount of RAM more than 64 GB workload dependent hibernation not recommended Table 2: Recommended system swap space per the author {.wp-block-heading} Amount of RAM Recommended swap space ≤ 2GB 2X RAM 2GB – 8GB = RAM >8GB 8GB
HiDPI (High Dots Per Inch) displays, also known by Apple’s “Retina Display” marketing name, are screens with a high resolution in a relatively small format. They are mostly found in high-end laptops and monitors. update this ~/.Xresources Xft.dpi: 240 reboot or re-login to system
1. Configure DNS Records In order to set up the desired redirect, www.example.com to example.com or vice versa, you must have an A record for each name. 2. Enable the mod_rewrite module 3.1 Update site.conf or .htaccess file ( www to non-www) 3.2 Update site.conf or .htaccess file ( non-www to www) Example ServerName example.net Documentroot /var/www/html/ ...
ike-scan is a command-line tool for discovering, fingerprinting and testing IPsec VPN systems. It constructs and sends IKE Phase-1 packets to the specified hosts, and displays any responses that are received. ike-scan does two things: Discovery: Determine which hosts are running IKE. This is done by displaying those hosts which respond to the IKE requests sent by ike-scan. Fingerprinting: Determine which IKE implementation the hosts are using. There are several ways to do this: (a) Backoff fingerprinting – recording the times of the IKE response packets from the target hosts and comparing the observed retransmission backoff pattern against known patterns; (b) vendor id fingerprinting – matching the vendor-specific vendor IDs against known vendor ID patterns; and (c) proprietary notify message codes. Ending ike-scan 1.9: 1 hosts scanned in 0.512 seconds (1.95 hosts/sec). 1 returned handshake; 0 returned notify ...