Vim bindings for midnight commander
ehh just use ranger
sandbox for the other blog to practise posting and try out ideas. build up that muscle memory.
Here’s a fun idea. Make musicals using chat gpt. These are the steps:
cleaver
npm install -g cleaver
run it with
cleaver path/to/something.md
tried pandoc and beamer which required latex packages to be installed. latex is too huge. cleaver is better nice and simple outputs it as html.
presenta web based md to slide show website.
Emmet + Vim - The Best Way To Write Html
Plug ‘mattn/emmet-vim’
“ Emmet shortcuts let g:user_emmet_mode=’n’ let g:user_emmet_leader_key=’,’
this remaps the awkward ctrl y + comma to just normal mode comma
Tried for ages to get this plugin working and i didnt see the comma!!!! I kept doing ctrl Y nothing happened. html:5 then ,, BOOM boilerplate html !!
https://github.com/tpope/vim-surround https://github.com/jiangmiao/auto-pairs https://github.com/ap/vim-css-color https://github.com/vimwiki/vimwiki https://github.com/907th/vim-auto-save https://github.com/mattn/emmet-vim https://github.com/plasticboy/vim-markdown
set background=dark syntax enable set nobackup set nowb set noswapfile set number set autoread set wildmenu set ffs=unix,dos,mac set encoding=utf8 set showmatch set backspace=eol,start,indent set autoread set wrap set si set ai filetype plugin on filetype indent on set tabstop=4 set shiftwidth=4 set smarttab set expandtab set nocompatible filetype plugin on set autowriteall set laststatus=2 " Emmet shortcuts let g:user_emmet_mode='n' let g:user_emmet_leader_key=','
cliptools lets you dump your entire clip history in one go
https://apps.apple.com/ca/app/cliptools/id1619348240?mt=12
https://www.youtube.com/watch?v=pGAqV0O__4w
Smart clips are clips you create manually instead of being imported from copied text. They can also use some very powerful special functions embedded in the text. For example, if you have the smart clip **The quick {clip:1} fox.**
and the first copied clip is currently **blue**
, then using the smart clip will paste The quick blue fox.
{clip:N} will paste the copied clip that is at the position N indicated by the number.
{date:M/d/yy} will paste the current date and time using the same formatting as the Paste Date and Paste Time commands. You can also use **|+**
and **|-**
like in those commands.
{ask:Which name?} will prompt you with the text Which name? to enter text that will appear in place of that function.
{pick:this|that|other} will prompt you to choose between this, that or other and then that will appear in place of that function. This prompt will also let you type in any text in addition to choosing from the list.
{random:this|that|other} will randomly choose between this, that or other and then that will appear in place of that function.
{selection} will use the text currently selected at that point in the Smart Clip. If no text is selected it will use the contents of the clipboard instead
Name | Type | Location | Phone | Website | Hours |
---|---|---|---|---|---|
D Hot Shoppe | Jamaican | 4155 Fairview St., Unit 12 Burlington, ON, L7L 2A4 | 905-631-8698 | https://www.dhotshoppe.com | Tuesdays - Saturday 11am-6pm Sunday & Monday (CLOSED) |
Piper Arms | Pub | 4155 Fairview St Unit 1, Burlington | 905.631.0002 | https://piperarmspub.com/piperarmspub/ | Sunday to Tuesday 11 AM - 12 AM Friday to Saturday 11 AM -12 AM |
Some of these are repeated multiple times.
These individuals, both real and fictional, are known for their iconic mustaches that have left an indelible mark on culture and history.
how to encrypt a txt
on a mac using terminal to encrypt then in shortcuts app converting it to data url.
the file i made is on desktop called YOURFILE.txt
run this in the terminal:
openssl aes-256-cbc -salt -in YOURFILE.txt -out encrypted_YOURFILE.txt.enc
shred -u YOURFILE.txt
to decrypt the file:
openssl aes-256-cbc -d -in encrypted_YOURFILE.txt.enc -out decrypted_YOURFILE.txt
REMOVE AFTER: >>
shred -u decrypted_YOURFILE.txt
TO DECRYPT
—————————
openssl aes-256-cbc -d -in YOURFILE.txt.enc -out YOURFILE.txt
How to encode it as a data url using shortcut
————————————————
data:application/octet-stream;base64,<urBase64filegoeshere>
Ask chat gpt to write the .ics text details for the event and then convert it to a data URL. This makes it possible to send calendars to people with phones that don’t have an add calendar event option.
The phrase "land of milk and honey" originates from the Bible, specifically the Old Testament. It refers to the Promised Land, which was described as a land flowing with milk and honey. The Promised Land is often associated with the region known today as Israel and its surrounding areas. In biblical context, it represents a place of abundance, prosperity, and blessings that were promised to the Israelites as they journeyed from Egypt to Canaan.
Royal jelly is a secretion produced by worker bees in a beehive. It is a highly nutritious substance that is fed to the queen bee and developing larvae. It plays a crucial role in the development and differentiation of larvae into queen bees. Some people believe that royal jelly has potential health benefits and use it as a dietary supplement.
The hype surrounding royal jelly stems from its reputation as a nutrient-rich substance with potential health benefits. Some of the factors contributing to the fascination with royal jelly include:
Nutritional Composition: Royal jelly is rich in proteins, vitamins, minerals, and fatty acids. It is particularly high in B vitamins, which play essential roles in various bodily functions.
Unique Source: The fact that royal jelly is produced by bees and used exclusively to nurture queen bees and larvae adds to its mystique and perceived uniqueness.
Traditional and Cultural Use: Royal jelly has been used for centuries in traditional medicine practices, particularly in some Eastern cultures, where it has been believed to promote vitality, longevity, and overall well-being.
Health Claims: Some proponents claim that royal jelly can boost the immune system, improve skin health, enhance energy levels, and even have aphrodisiac effects.
Limited Availability: Due to the labor-intensive process of harvesting royal jelly and its relatively small production within beehives, it is often considered a rare and precious substance, contributing to its allure.
royal jelly plays a crucial role in the development of queen bees. When a colony of honeybees decides to raise a new queen, the worker bees select a young larva that is only a few days old. This larva is fed a diet of royal jelly exclusively, unlike the diet of worker bee larvae which includes pollen and honey.
The consumption of royal jelly triggers specific genetic and physiological changes in the selected larva, causing it to develop into a queen bee. Queen bees are larger, have fully developed reproductive organs, and live longer than worker bees. They also exhibit distinct behaviors, such as leading mating flights and laying eggs.
The royal jelly serves as a source of nutrients and growth factors that enable the development of queen bees. This remarkable transformation from a regular worker bee larva to a queen bee showcases the significance of royal jelly in honeybee biology.
Bee propolis is a natural resinous substance that honeybees collect from various plant sources, such as tree buds, sap flows, and botanical exudates. The bees mix the collected resin with their own enzymes, beeswax, and pollen, creating a sticky and glue-like substance. They use propolis to seal gaps and cracks in their hives, reinforce the hive structure, and protect it from intruders and external elements.
Propolis has been used by bees for its antimicrobial properties, helping to maintain the cleanliness and health of the hive. It contains a complex mixture of compounds, including flavonoids, phenolic acids, and other bioactive substances, which contribute to its potential health benefits.
In human use, propolis has gained attention for its potential health-promoting properties, such as antioxidant, anti-inflammatory, and antimicrobial effects. It has been used in traditional and alternative medicine practices for various purposes, including supporting the immune system, soothing sore throats, and promoting skin health.
was playing with close voice tone clusters in em. [e,gb,g,b] (1,2,b3,5)
practiced that voice into muscle memory so was playing over some changes and played it out of habit by mistake over a C chord woah. what is that over C? [3,b,5,7] (major7b5)
reminded me of b byzantine the b to c half step phrygian thing.
major7b5 can be thought of as minor chord
either aeolian or phrygian.
as a sub for a b7 gmaj7b5 [g,b,db,gb] (b6,1,2,5) in relation to b major scale.
aeolian and phrygian have flat 6 dorian doesn’t.
b6,1,2,5 drop the 1 and 5 there redundant.
think of it as b6/or sharp5 with a 9.
Terms I came across learning about computers
X-callback is a standardized protocol used in software development for communication between apps on mobile devices. It allows one app to trigger actions or pass data to another app and then receive a response or data back. This protocol is often used to enable deep linking, which lets users navigate directly to specific content or features within an app from another app or source. It's commonly used in automation workflows and enhancing user experiences by enabling seamless interactions between different apps.
Percent encoding, also known as URL encoding or percent-encoding, is a way to represent characters in a URL (Uniform Resource Locator) or URI (Uniform Resource Identifier) that may have special meanings or could cause issues if used directly. It involves replacing reserved or unsafe characters with a "%" symbol followed by their hexadecimal ASCII code.
For example, if you want to include a space in a URL, you would encode it as "%20". Similarly, the percent sign itself is encoded as "%25". This ensures that URLs remain valid and correctly interpreted by web browsers and servers.
Percent encoding is used to handle characters that have special meanings in URLs, such as spaces, punctuation, non-ASCII characters, and reserved characters like "/", "?", "&", and "=".
Overall, percent encoding helps ensure the proper functioning and accuracy of URLs across different web systems and applications.
Base64 encoding is a method used to encode binary data into a text-based format that is safe for transmission over text-based protocols or storage in text-based formats. It is commonly used to represent binary data, such as images, files, or binary messages, as a series of ASCII characters.
In Base64 encoding:
The mapping table consists of 64 different characters: uppercase letters (A-Z), lowercase letters (a-z), digits (0-9), and two additional characters, often "+", and "/", which represent the values 62 and 63. These characters are chosen to ensure compatibility with various text-based systems and protocols.
Base64 encoding is used in various applications, such as:
When you see a Base64-encoded string, it may look like a random series of characters, but it actually represents the original binary data in a text-based form. Decoding the Base64-encoded string restores the original binary data.
Webhooks are a way for one application to send real-time data to another application over the internet. They are typically used to notify or trigger actions in response to events that occur in the source application. When an event happens, the source application sends an HTTP POST request with relevant information to a predefined URL (the webhook endpoint) of the receiving application. This allows for seamless communication and integration between different systems, enabling automated processes and data synchronization.
Hashing is a process of converting input data (like a password) into a fixed-size value (the hash) using a mathematical function. It's often used in security to store passwords securely, as the original input can't be easily derived from the hash.
Salting is the practice of adding a random value (the salt) to the input data before hashing. This adds a layer of security by making it more difficult for attackers to use precomputed tables (rainbow tables) to crack passwords.
Together, hashing and salting enhance data security, making it harder for malicious actors to reverse-engineer passwords from stored hashes.
they are the crew responsible for giving us all these great acronyms. HTTP, SMTP, TCP, DNS, TLS, SSH, OAuth, Websocket, IPV6, and XMPP!!! they were also responsible with VCF (vcards) and ICS (ical)
HTTP (Hypertext Transfer Protocol): The protocol used for transferring data over the World Wide Web. It defines how web browsers and servers communicate.
SMTP (Simple Mail Transfer Protocol): The protocol used for sending and receiving email messages.
TCP (Transmission Control Protocol) and IP (Internet Protocol): The foundation of internet communication, defining how data is transmitted and routed across networks.
DNS (Domain Name System): The system used to translate human-readable domain names (like www.example.com) into IP addresses.
TLS (Transport Layer Security) and SSL (Secure Sockets Layer): Protocols that provide secure and encrypted communication over networks, commonly used for secure web browsing (HTTPS).
SSH (Secure Shell): A cryptographic network protocol for secure remote access to computers.
OAuth (Open Authorization): A standard for authorization, allowing third-party applications to access resources on behalf of a user.
WebSocket: A protocol that enables bidirectional communication between web browsers and web servers over a single, long-lived connection.
IPv6 (Internet Protocol version 6): An updated version of the Internet Protocol that expands the address space to accommodate the growing number of devices connected to the internet.
XMPP (Extensible Messaging and Presence Protocol): A protocol for real-time messaging and presence information, commonly used in instant messaging and chat applications.