Current version is 9.1.3. So, Dear User, let's dive into.. Install TAM. cargo install sark0y_tam_rst Run TAM. fish> nano ~/.fishrc alias tam.rst='sark0y_tam_rst -find-files -path /path/to/dir -cols 3 -rows 9 -in-name \'pass==-iE \w\' -view-w "flatpak run info.smplayer.SMPlayer" -view-w "smplayer" -view-w "gwenview" -dont-exit $argv' bash> nano ~/.bashrc alias tam.rst='sark0y_tam_rst -find-files -path /path/to/dir -cols 3 -rows 9 -in-name "pass==-iE \w" -view-w "flatpak run info.smplayer.SMPlayer" -view-w "smplayer" -view-w "gwenview" -dont-exit $@' So, now it's possible just.. > tam.rst Some terminology.. Actually, TAM provides commands & subcommands: for shorter notation, c{...} is a command; s{...} is a subcommand + we have hotkeys {UpArrow}, {DownArrow}, {Insert} etc. If a context is known for sure - just use {...}. For instance, c{sieve ...} == {sieve ...}. The very P
2023 08 15 1.7-17: now it's possible to rename files.. So, how to: ren <file index> <new name> press TAB to expand <file index> into full or short form - just type command "ren <file index>" and press TAB. Tip: press F12 to reset command line. 2023 08 17 1.7-23: makes possible to copy files ==>> cp <file index> <new name> Actually, "cp" command has the same routine as the "ren". PS.. keep in mind: this variant overwrites existing file silently. 2023 08 18 1.7-29: 'cp' command is safe. 2023 08 19 1.7-31: resolved sad problem w/ apostrophe in file names :) 2023 08 21 so far the're problem to search files with apostrophe in their names, thus we can use crutch-ish workaround: -in_name 'grep==-E [^a-zA-Z.\d\s]s\s|[^a-zA-Z.\d\s]t\s' 2023 08 23 1.7-35: "rm <file index>" to delete file. TIP: killed file gives "::D" mark in the table, otherwise a file wasn't removed.
So, let's take for model Windows + Router : our very goals have been... Protect ourselves from botnets & trojans. Teach Windows to behave not that bossy w/ its hidden activities & annoying updates. 1st of the all, we need to block direct access of Windows to Internet: it can be achieved w/ Router's Firewall (You can block/allow access by mac address + can change mac address of network card(s) in W10/11). 2nd step is, opt web proxy: it can be Router's Proxy / Linux machine in Your local network (for example, Squid proxy is rather good shot) / external VPN (then it takes to opt Router's Firewall additionally). It's obvious that Microsoft can easily bypass such protection, but here has been the juridical catch - they would have shot selves in their own feet, if they would have used trojan-like approaches in so open manner. There been very Law for big corporations... Any controversial/dirty practice must be either well-hidden or non-existed at all. However, som
Comments
Post a Comment