Skip to main content

Posts

Showing posts from May, 2024

equivs to hack debian dependecies example

   sudo apt install equivs https://salsa.debian.org/xorg-team/lib/mesa/-/blob/debian-bookworm/debian/control?ref_type=heads equivs-control python Section: python Priority: optional Standards-Version: 3.9.2 Package: python-dummy Version: 1.0 Maintainer: Your Name <[email protected]> Provides: python3:any , python3-minimal:any Architecture: all Description: A dummy package to provide Python dependency  This package is a placeholder that provides the Python dependency  without installing the actual Python packages. equivs-build python  hostname: Name or service not known dpkg-buildpackage: info: source package python-dummy dpkg-buildpackage: info: source version 1.0 dpkg-buildpackage: info: source distribution unstable dpkg-buildpackage: info: source changed by Your Name <[email protected]> dpkg-buildpackage: info: host architecture amd64  dpkg-source --before-build .  debian/rules clean dh clean    dh_clean  debian/rules binary dh binary    dh_update_autotools_config    dh_autore

shim-signed for systemd-boot-efi in debian without grub

    https://packages.debian.org/bookworm/shim-helpers-amd64-signed /usr/lib/shim/fbx64.efi.signed /usr/lib/shim/mmx64.efi.signed  https://packages.debian.org/bookworm/shim-signed /usr/lib/shim/shimx64.efi.signed   dpkg -x shim-helpers-amd64-signed_1+15.7+1_amd64.deb shim dpkg -x shim-signed_1.40+15.7-1_amd64.deb cd shim/usr/lib/shim/  ls  fbx64.efi.signed mmx64.efi.signed shimx64.efi.signed  mv fbx64.efi.signed fbx64.efi && mv mmx64.efi.signed mmx64.efi && mv shimx64.efi.signed shimx64.efi  ls fbx64.efi  mmx64.efi  shimx64.efi sudo  cp *  /efi/EFI/systemd/   debian shim is looking for grubx6.efi  in the same directory cp systemd-bootx64.efi grubx64.efi next time you boot it will load mok(machine owner key)  manager mmx64.efi select enroll hash and browse to two files one by one  ../systemd/grubx64.efi   /efi/xxxxxxxx/linux    [maybe not needed for debian?]   after reboot secure boot is working  add bios password to lock settings and extra security   https://packag

all rgb hue in bash

  for _1 in {0..255};do for _2 in {0..255};do for _3 in {0..255};do echo -e "\033[48;2;${_1};${_2};${_3}m$_1:$_2:$_3"; read -t 0.01 -s;done;done;done    https://www.reddit.com/r/bash/comments/jhsw1x/all_rgb_colors_in_bash/     for _1 in {0..255};do for _2 in {0..255};do for _3 in {0..255};  do  swaymsg bar bar-0 colors background '#${_1}${_2}${_3}';  read -t 0.01 -s;done;done;done     echo -e "\033[48;2;${_1};${_2};${_3}m$_1:$_2:$_3"     swaybar color transition    cat col.sh  for i in {0..255}; do for j in {0..255}; do for k in {0..255}; do # Convert the decimal numbers to two-digit hexadecimal hex_i=$(printf '%02x' $i) hex_j=$(printf '%02x' $j) hex_k=$(printf '%02x' $k) # Set the background color of bar-0 swaymsg bar bar-0 colors background "#$hex_i$hex_j$hex_k" echo "#$hex_i$hex_j$hex_k" # Wait for a short period before changing the color again read -

accesibility gtk dbus disable , at-spi disable

Set environment variable in .xprofile or .xinitrc (sytemwide: /etc/environment) export NO_AT_BRIDGE=1 BUT: Unfortunately, even with NO_AT_BRIDGE=1 at-spi-bus-launcher is still launched by certain applications. /usr/share/dbus-1/services/org.a11y.Bus.service     Try adding this in pacman.conf: NoExtract = usr/share/dbus-1/accessibility-services/org.a11y.*     # no leading slash!!     doing this will get error in apps that use accesility running from terminal like no acessili-xx.service found, non fatal mostly except orca/acessibility app maybe.   sudo rm / usr/share/dbus-1/accessibility-services/org.a11y.* Optional: killall at-spi2-registryd; killall  at-spi-bus-launcher     src https://itnotizen.wiki.zoho.com/at---spi2---service---start---verhindern.html     https://packages.debian.org/bookworm/amd64/at-spi2-core/filelist /etc/X11/Xsession.d/90qt-a11y /etc/environment.d/90qt-a11y.conf /etc/xdg/Xwayland-session.d/00-at-spi /etc/xdg/autostart/at-spi-dbus-bus.desktop /us