Besen, Besen seids gewesen

ok, there is whole story behind me blogging here. Where to start? We got problems with firefox, to an extend that we might want to end an application session such as by eminent killall. To this is to mention that firefox apparently got its own –killall option. We ask how use it humanly best else, and find that there is no way around setting up the next interface: ghacks and co.. ? Yes, we need, -need- setup synthetic defaults, not own, but that of ghacks and co -this while firefox itself warns to retract the interface in future due to security concerns, I got no notion of, and as they yet did for reading access of their defaults – this said in order to characterize a little the reality situation (it is not even possible to look up one’s blinking default values of a flutterfox by a visual work flow means such as sikuli, am I just reading here,- but I mean they could.) of usage these day. A little: hopefully, though.

Now: lets see, how this works out.

We need to learn an understanding of both ghacks and firefox ff,

-gather and demo a some substantial pieces of usage feature from it, such as: „never-popup-anything„, „fledermouse-tame-as-gnu“, and we will see what more, by it . An „as-if-defaults“-Interface Feature.


So at this journey we opt to pass the places:



Borgo pass just kidding:

1. Bug-data base study,

2, Github download,

3.thesaurus of each/glosary

3.b Testsystem of each

(dragnet search for oracles of a unittest site: None in reach so far, maybe in the ff dev scope, there is still no way to run a test on a special user.js-config-api and check it success non-interactively, to be precisely. One should request one…)

4.:analyse it input as long as suitable output

4.1 setup ghacks

4.2 setup own applications of it


-5 release results: resembled methods how to use ff feature 1 to x, as found by a novice, thus the title from Gueetees  Zauberlehrling on top of googles result list here

,and for

  • -thus how to grow on I
  • -and hopefully everybody, last but not least.
  • -So, and we hopefully give a feedback to especially these uh: ghacks projects for first usage experiences of their software, in first line, too.
  • -And yes, just in case, it would be nice to check a the comparison to tor-browsers fingerprinting setup, possibly tor-less.
  1.  ok, well then lets start from a google search finding:

938 commits
1 branch
23 releases
9 contributors
2.38 MB


How many different such synthetic user.js files did we then earn from it, plse?

n=n1*n2*n3; ghacks kind projects by now n1, n3 number of ff version supported, n2 ghacks releases?

Tough nut to crack..

Appendix Testurls 60, none useful to 3b   Appendix B: References    Mozilla, Tor whitepapers (3.) for this interface. #partner, a „rebased fork“ of ghacks softcore version, „relaxed“, how precisely does he refer to the above ghacks?


wget –|grep -A2 „Manifest“

Many (open source) hackers are proud if they achieve large amounts of code, because they believe the more lines of code they’ve written, the more progress they have made. The more progress they have made, the more skilled they are. This is simply a delusion. uhu.

You say.

and then since 2015 uh, do not know how rebase/forked.

But then altogether we got 2*2=n1=4 user.js repos by a 1000 commit=n2 or otherwise by n3=50 releases~ff releases 55-65

altogether a stack 4ooo 200 user.fs file, pls!

Yes, but broken down for testing we got 2+2=4 user.js counts I, 1 hardcore, 1 softcore per ff version by two teams. pyllyukko and Thunderboat,right? cl pls, too.

983 commit deep, 23 releases wide stack of user.js text file, but, and 2 scripts: one reset to default with read them, and the other some (appendix) update mechanism, making use of a) ff user.js b)ff prefs.js  c)ghach overwrite-user.js d) pool ghack-user.js

Next day

now lets first download the source of firefox (1), tor (1), ghacks and co (4), as if for compile

have I the dl urls via (git learn some git todoy (;) if possible?

(git clone -b relaxed
git clone
git clone
git clone &

git clone –depth 1 #is around 0,4G and includes a firefox fork.

hg clone

du -sh
872M . They say „come here, get your sources, of firefox. They load and load, they do not say how much and load 1G and do not stop, I got no money: I buy my Internet 5G for 20 Euro. Look how bad they are! I killall hg, and what do I get in the directory of 800M a .hidden folder, .hg! Bah, and whats that? Even without growing the dl dir, they keep on downloading to 1,3G, till my phone messages only 20% bandwidth left..$%&$$.. 20 minutes later (:
ps aux|grep hg
#tu 31450 19.2 58.3 3688044 3512788 pts/9 S+ 12:57 7:37 /usr/bin/python /usr/bin/hg clone
kill -9 31450#I have been pulped out, left with 1G. Simple_Firefox_build

wines he (;

A lexical overview of the user.js API pls

source1018$ ls
firefox-ownyourbits-user.js ghacks-user.js tor-browser user.js user.jssoft #there are my seven dwarfs

-How many how big file user.js are there?

for i in $(find . -type f|grep "user.js\$"); do grep "^user" $i|wc -l|tr "\n" ":"; wc -l $i; done;
37:37 ./tor-browser/js/src/tests/user.js
37:37 ./tor-browser/js/src/tests/user.js
274:1143 ./user.jssoft/user.js/user.js
479:2116 ./ghacks-user.js/user.js
274:1143 ./user.js/user.js
453:2117 ./firefox-ownyourbits-user.js/user.js
#so we got 2*2 hard/softcore variants, one time 300 entries another 500, each entry around 3 comment line. 
#For sure we got no version specific out just the on top commit, to amend.

We could ask: how many entries have been changed from hard to soft? mom

cat ./user.jssoft/user.js/user.js ./user.js/user.js|grep „user“|sort|uniq -u|wc
0 # none

cat ./ghacks-user.js/user.js ./firefox-ownyourbits-user.js/user.js|grep „user“|sort|uniq -u|wc

66 # we should bet on a 50 hm

In order to learn the api how many top level domains is this class bearing, which?

for i in $(find . -type f|grep „user.js\$“); do cat $i|grep „^user“|sed -e „s/^u.*f(\“\(.*\.\).*/\1/“; done|sort|uniq|wc
317 #well these are from the lass dot, the first dot were? 59

I could ask how many occurrences each in theses files

for a in $(for i in $(find . -type f|grep „user.js\$“); do cat $i|grep „^user“|sed -e „s/^u.*f(\“\(.*\.\).*/\1/“; done|sed -e „s/\(^[a-z]*\).*$/\1/“|sort|uniq|tr „\n“ „\ „); do grep „$a“ ghacks-user.js/user.js |wc -l| tr „\n“ “ „; echo $a; done|sort -n|tr „\n“ „:“
0 hangmonitor:0 shumway:1 alerts:1 beacon:1 breakpad:1 captivedetect:1 layers:1 middlemouse:1 pfs:1 places:2 lightweight:2 mathml:2 webchannel:2 xpinstall:3 keyword:3 pdfjs:4 layout:4 shield:5 accessibility:5 devtools:5 signon:6 camera:6 canvas:7 experiments:7 intl:8 clipboard:8 datareporting:8 gfx:9 general:9 javascript:9 loop:9 offline:9 social:10 webgl:11 services:13 permissions:14 plugins:15 geo:17 device:19 full:19 toolkit:27 font:34 plugin:42 ui:43 app:45 extensions:46 media:50 page:60 network:62 privacy:78 dom:81 security:198 browser

#we see browser is 198  leading the name spaces,

followed nip and tuck by  privacy:78 dom:81, network:62 qualified for cl,

then in the anterior midfield plugin:42 ui:43 app:45 extensions:46 media:50 page:60 for let us say the European contests,

gfx:9 general:9 javascript:9 loop:99 offline:9 social:10 webgl:11 services:13 permissions:14 plugins:15 geo:17 device:19 full:19 toolkit:27 font:34 had an ordinary season.

These are (threatened) to be relegated: 0 hangmonitor:0 shumway:1 alerts:1 beacon:1 breakpad:1 captivedetect:1 layers:1 middlemouse:1 pfs:1 places:2 lightweight:2 mathml:2 webchannel:2 xpinstall:3 keyword:3 pdfjs:4 layout:4 shield:5 accessibility:5 devtools:5 signon:6 camera:6 canvas:7 experiments:7 intl:8 clipboard:8 datareporting:8

googling for an API such as gives . It should be cumbersome to guess what a single function unit as for example browser makes out: But I think that might be units comprised in the scope of Graphical Human Interface; part of the window and so on. The like the other „top level“ container or classes … so we learn a little about the problems a browser producer dreams of, no? What should be „page“ or „app“ (is it Android app or did he earn another plugin?-word?

Can I get a little stat about how many, files, of which kind?

du -sh *|wc
tree -d -L 2|wc -l
tree -d -L 3|wc

du -sh *|sort -h|tail|tr „\n “ „\ “
74M browser 78M gfx 80M security 83M toolkit 112M media 163M layout 205M dom 222M third_party 246M js 438M testing # in this contest of 72 browser is on place 8. Written in C++, JavaScript, HTML, C, Rust[7]

time find|sed -e „s/^.*\([.][a-z^/]\+\)$/\1/“|grep -v „\/“|sort|uniq>t1

find >tf;
for i in $(cat t1); do cat tf|grep „$i““$“|wc -l| tr „\n“ “ „; echo “ $i“; done|sort -n|uniq|tail|tr „\n“ “ “
8458 .c 8635 .i 15705 .xht 15914 .h 24002 .t 55994 .js 64786 .html 66440 .s 73358 .l 252980 #60t html files? Progamming in html??

„“ it is an API, where does it show up in code? Is it defined somewhere? Is it defaulted somewhere?

wc browser/app/profile/firefox.js #I found are it the defaults? Maybe (;

grep –color=auto -irsi „“ | wc # a 20

Frankly this mess seems impenetrable. What to do? 

How is that all organized, I am still asking? Is there a guide through firefox code?? init sequence guide?

Oh, I asked in irc torbrowser and firefox, I should ask twice, maybe in forum. In torbrowser they said they could not believe that there were  not 10. But, that is what it however seems to me: There is no for ff.

What is about 3b debug logging how is it not possible? http,    Development preferences ​or here #as is http ua, there is logging. tbi

Resuming: Using torbrower or firefox-user.js?

-tor browser has a dynamic fingerprinting fake , ffuserjs far is from. Well now I learned lot of thinks about ff.and the user.js interface. I should close it, and run and trust on torbrowser.

according to the tor support it static, and yes to be awaited mainstream ff tomorrow, even.

—>By the time I will find that features promised above, such never popup a dialog, and complete it here, when implemented – by and by, and having slept some nights over that framework, too.

-I need a user.js tweak however to to tweak torbrowsers I had a tutorial somewhere? where? It says to use about:config instead of user.js partly, why?

on the other hand: „that also means that if you use tor browser without tor, you’ll be „that guy who uses tor browser without tor“


-I should at least try out any user.js to see it they crash.

Why that? It comforts me to „lightweight“ leave with nothing substantial. – For now. That is it, bye.

Besides a tor-browser ubuntu install/tar gz install:

do not forget:

gpg –homedir „$HOME/.local/share/torbrowser/gnupg_homedir/“ –refresh-keys –keyserver

and: ./.local/share/torbrowser/tbb/x86_64/tor-browser_en-US/Browser/start-tor-browser #to start it

cat ./.local/share/torbrowser/tbb/x86_64/tor-browser_en-US/Browser/TorBrowser/Data/Browser/profile.meek-http-helper/user.js|grep user|wc
15 # another user.js on disk, meek?


heute morgen tcpdump


we got the story as follows: They were on a way to a libfirefox-sed, over a gifgui interface, which is the old woman witches name gifgui not to say rather Blocksberg, that is they way I call it. Such the user-agent needs http checks for quick unit-test, test driven development requirements, at this day state of art takes its place.

At this anniversary a note: „learn requests about http dayly issues“: The communication stack of a personal user-agent autopilot to read.

http. Whats about http? A http overview on hundred pages.

Which solving of which kind of questions are we looking for? Wait…

Just think of a capture stack file from a packet sniffer, for to get every package sorted in 2., that analyzed, and first to „determine the relevant package“, one is looking for lets say, at the time of quick unit tests finding firefox2http-lib.

Question: So what we think of: a: Http-Session

(This word is not existing: Connection) , and as each layer got Session too, Vocabulary:

 For example, HEADERS and DATA
   frames form the basis of HTTP requests and responses __(:httpFrames) (Section 8.1);
   other frame types like SETTINGS, WINDOW_UPDATE, and PUSH_PROMISE are
   used in support of other HTTP/2 features.
  frame:  The smallest unit of communication within an HTTP/2
      connection, consisting of a header and a variable-length sequence
      of octets structured according to the frame type.
streaming:  A bidirectional flow of frames within the HTTP/2 connection, 
, of endpoint peers, sender and receaver, a client intiatiates, 
before sending and receiving requests and responses.
Tasks 1: Demonstrate: filter and explain the http sessions by filtering the captured packages stack by http-ongoings! 
Just the whole story explaining the beasts from http's rfc, to measuring this here one, which met in reality. 
Let us say: by just grep, sed, and tcpdump, a forensics. -cl pls? 
(See solution below, t-shark, we got an sort in of our http-connection and event line of http-packets filtered, in Http(s) 
and DNS. What we fail is reduce filter to our useragent's stream.)
Question: What does this mean: tcpdump -s 500 -W 6 -C 1 -w /tmp/tcpdump # first 500 packets? 
#No, first 500 hundred bytes of each package, cover the header information. 
# buffered 6 ? logrotate: chain-length #1 mb big Capturefile ? log-rotate: size 
# this cl has no expression: man tcpdump: 10 Pages: "no expression is given, __all packets__ on the net will be dumped" 
#"For the expression syntax, see pcap-filter(7)" manual "group of primitives and operators" 
Question: What does this for example mean? #"icmp[icmptype] != icmp-echo and icmp[icmptype] != icmp-echoreply 
#? filter non-ping traffic, ok? #"expr relop expr";relop: #
" access data inside the packet," "proto [ expr : size ]",
 "protocol layer for the index operation" "ether, fddi, tr, wlan, ppp, slip, link, ip, arp, rarp, tcp, udp, icmp, 
ip6 or radio," 
#icmptype: protocol header field offsets 
#icmp-echo: ICMP type field values  
#Question: And how without root? 

Is this suitable for standard capture? In Format the data available? 
--- session started: I had little http session,
 some page loaded by formular: 2573_ packets received by filter 0 packets dropped by kernel 
ls -l /tmp/tcpdump0 
#the postfix zero append by log-rotate #-rw-r--r-- 1 root root 712213 Sep 26 19:56 /tmp/tcpdump0 file /tmp/tcpdump0 
#/tmp/tcpdump0: tcpdump capture file (little-endian) - version 2.4?? (Ethernet, capture length 500)? 
# tcpdump -r /tmp/tcpdump0|grep arbeit|wc #reading from file /tmp/tcpdump0, link-type EN10MB (Ethernet) 
# 1352 19462 166598 #we got imagine 1352 lines with word "arbeit".com in it. 
#Pretty busy this seems, is not it: 1352

tcpdump -r /tmp/tcpdump0|grep HT|wc 
#reading from file /tmp/tcpdump0, "link-type EN10MB (Ethernet) 28__ 652 4958" (Format) 
tcpdump -r /tmp/tcpdump0|grep HT|grep arb reading 
#Nothing, did not show "use-connection" from file /tmp/tcpdump0, link-type EN10MB (Ethernet) 
#to say this is all about Certification Authentication traffic first, and second nothing of ours: 
We are completely mislead and lost signal. 
Question: Why? How? We cannot filter the Http from our pardon, 
from "link-type EN10MB (Ethernet)"-Format? To assert a Http-connection diplay?? (No)
So how about connections-storys? (See oracle below.)
tcpdump -A -r /tmp/tcpdump0 port 53 |wc -l 
# -A 276m # "-A Print each packet"
# Half of the packet are missing without.
#Question: Which kind of rotten stuff tcpdump -A shows?
#-n ip numbers 
#-t no timestamp 
tcpdump -t -n -r /tmp/tcpdump0 port 53 |head -n1 
#IP > 36699+ A? (36) 
# where: 
ifconfig |grep|wc -l #1 localhost 
nmap|grep 53 #53/tcp open domain #DNS Server 
# So "36699+ A? (36)" What is it? 
And by all: 
Question: Why dont I grasp original http session with it? tshark -r /tmp/tcpdump0 -qz "io,phs" #-qz "io,phs" ? (Sure)
Protocol Hierarchy Statistics

eth frames:2571 bytes:1434328
ip frames:2567 bytes:1434160
tcp frames:2441 bytes:1420024
ssl frames:1237 bytes:1262569__?[1]
_ws.short_??  frames:894 bytes:1063216
data frames:51 bytes:67018__?
http frames:24 bytes:18557
_ws.short frames:19 bytes:17727

udp frames:126 bytes:14136
dns frames:126 bytes:14136
arp frames:4 bytes:168
Question: Does this mean that I can not see the http packets anymore in tcpdump,
 since encrypted in https, I wonder?? Really? Yes.
   "Example usage (with parameters that fit MY system) : 
   tshark -i eth1 port 443 -o "ssl.keys_list:any,443,http,/path/to/your/server.key" -o ssl.debug_file:"/home/your_user/ssl_debug.log""
#-o "ssl.keys_list:any,443,http,/path/to/your/server.key"?
#server? key? Firefox?
#Question: Here is the original http traffic in, both headers and data? Yes.

cd /tmp/
tcpdump -w eth0.pcap
SSLKEYLOGFILE=sslkeys.txt firefox
tshark -r eth0.pcap -o "ssl.keylog_file: sslkeys.txt" -Y http|grep tellen|wc     # 6      61     845
#now we find the inner http frame in
tshark -r eth0.pcap -o "ssl.keylog_file: sslkeys.txt" -qz "io,phs"
eth                                      frames:1861 bytes:461090
  arp                                    frames:14 bytes:588
  ip                                     frames:1847 bytes:460502
    tcp                                  frames:1683 bytes:440639
      ssl                                frames:506 bytes:275382
        tcp.segments                     frames:73 bytes:64257
          ssl                            frames:68 bytes:61121
            http                         frames:4 bytes:3670
              data-text-lines            frames:2 bytes:1528
                ssl.segments             frames:2 bytes:1528
              image-gif                  frames:1 bytes:1064
                ssl.segments             frames:1 bytes:1064
              image-jfif                 frames:1 bytes:1078
                ssl.segments             frames:1 bytes:1078
        http2                            frames:32 bytes:8291
          ssl.segments                   frames:2 bytes:495
            http2                        frames:2 bytes:495
        http                             frames:74 bytes:47454
          data-text-lines                frames:14 bytes:11342
            tcp.segments                 frames:1 bytes:213
            ssl.segments                 frames:3 bytes:2730
              tcp.segments               frames:1 bytes:207
          media ?                         frames:1 bytes:305
          json    ?                       frames:3 bytes:2254
            tcp.segments                 frames:1 bytes:966
          image-gif  ?                    frames:4 bytes:2612
            ssl.segments                 frames:1 bytes:283
              tcp.segments               frames:1 bytes:283
          urlencoded-form                frames:1 bytes:687
            tcp.segments                 frames:1 bytes:687
          image-jfif   ?                  frames:5 bytes:3482
            ssl.segments                 frames:5 bytes:3482
              tcp.segments               frames:5 bytes:3482
      http                               frames:30 bytes:16936
        data-text-lines                  frames:2 bytes:900
        ocsp?                             frames:26 bytes:15312
          tcp.segments                   frames:7 bytes:3637
      _ws.malformed                      frames:1 bytes:1414
      data                               frames:4 bytes:394
    udp                                  frames:164 bytes:19863
      ssdp??                               frames:8 bytes:1664
      dns                                frames:156 bytes:18199

#ocsp? Certificates biz
"definitive response
   indicators for use in the certificate status value:
   - good
   - revoked"
json? the js bin
#media ?

tshark -r eth0.pcap -o "ssl.keylog_file: sslkeys.txt" -Y http -Px|grep lekt|wc #this give you solution 
# 13 250 961 find the key words in plain text, ok #x hex; P summary package line


#some links I googled: #best ofs #[1] #api # -A? -x? tcpdump magic filter bitmasking              


import scapy; tcpdump = sniff(count=5,filter="host",prn=lambda x:x.summary());
print tcpdump

“ filter based upon the content of the packets (no deep packet inspection)“. Using -vv gets you pretty close“ tcpdump -i lo -A tcp port 80 # garbage output #ngrep

ngrep -I eth0.pcap -q -d eth1 -W normal port 80|grep
#GET /success.txt HTTP/1.1..Host: Mozi
#GET /success.txt HTTP/1.1..Host: Mozi
ngrep -I eth0.pcap -q -d eth1 -W byline port 80|grep  #“byline!: the header in lines
  tcpdump -r /tmp/eth0.pcap 'udp[0xa] & 0x78 = 0x28'# nothing

Next day

Well, this morning I thought to follow scheme as follows:

To best pimp up your packet filtering abilities, around the garage of tshark, the best practice was to follow an oracle of an:

project firefox in quarantine, lets have resetted and its config in tmp while loading and co-acting on a online page as useragent xy during a http connection. It costed me at this time just one line orcle in the Testsuite file, checking kind checksum of compromising. Indicator 1 tbc: amount of package*amout of download in MB.


Question: How is restricting filtering packets only to those related to a single firefox instance? still. ( Speculation: Narrow down Http – connections – user agent, trace ua-ports,

Question: Which browsers are there?
tcpdump -t -n -r /tmp/eth0.pcap port 53|wc  #|grep "t[our].de": there are, which?
reading from file /tmp/eth0.pcap, link-type EN10MB (Ethernet)
    156    1506   15354

According to [1] "Extract HTTP User Agent from HTTP request header."
tcpdump  -r eth0.pcap -nn -A -s1500 -l | egrep -i 'User-Agent:|Host:'|sort|uniq
reading from file eth0.pcap, link-type EN10MB (Ethernet)
Host: I
Host: I
Host:  I
Host: I
Host:  I
USER-AGENT: Chromium/69.0.3497.81 Linux
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
#from both encrypted we find the two browsers in network, together with their common suspects of key-server [4] connect
#"Gecko": What does that mean?
#-l? Geckostdout line buffered.  Useful if you want to see  the  data while capturing
tcpdump -r /tmp/eth0.pcap -s 0 -v -n -l | egrep -i "POST /|GET /|Host:" #Extract HTTP Request URL's
#-v  parsing and printing, produce (slightly more) verbose out‐
              put.  For example,  the  time  to  live,  identification,  total
              length  and  options  in an IP packet are printed.  Also enables
              additional packet integrity checks such as verifying the IP  and
              ICMP header checksum.
#Question: How the output of decrypted stream of tshark to clamp there in front a such a "tcpdump -r t"-like 
output stream? Possible? Not Possible? (the first: different "dissection" styles)
#tshark and tcpdump have different dissection style for stdout output stream, unverbosely they got a deliver same lines number
at lest: But where stands "POST" here, stands "OLSP Request" there.
tshark -PV -r eth0.pcap | egrep -i 'User-Agent:|Host:'|sort|uniq# best workaround_ finding mainly the same, without x,

Question: How to get all urls connections with then? DNS included? (below DND only)

tshark -r /tmp/eth0.pcap -Y "dns.flags.response == 0"|sed -e "s/.*A \(.*\)/\1/"|sort|uniq|tee tmp|head -n1; wc -l  tmp;
36 # these are living in the actual tabs covered by encryption.
#-Y "dns.flags.response == 0" #Y is display filter; dns.flags.response .. its expression, an element of.. rtm
# without it no exposed dns lines available.....

Question: Can I get the urls that have been processed inner https Stream, too? (yes)

tshark -PV -r eth0.pcap -o "ssl.keylog_file: sslkeys.txt"| egrep -i 'User-Agent:|Host:'|sort|uniq |tee tmp1|wc

tshark -PV -r eth0.pcap | egrep -i 'User-Agent:|Host:'|sort|uniq|tee tmp0|wc
cat tmp0 tmp1 |sort|uniq -u|wc
    Host:\r\n I
    Host: ..t[our].de\r\n <-- Usecase specific
What a noise: for one Http connections host: connects to 16 host all included in the 36 dns listed, guesses I. I count 5 different 
domains at it.,,, ,,, two for home phoning and 
3 for certification biz. 

So then, well, bye! should leave you a pointer once. ... <--to complete here, while resolving this problem denounced 
the ffsed oracle, above, right?. tch, so bye, we see us again.

Questions? Yes. 

Question: Give me finally more detailed display of http entities as named in the rfc: "stream" of a "connection",
 out of this, pls? 

Java Geschichte?:jshell admin{Tutorial Reise durchs Dateisystem}

Hat java ne Geschichte, die man Wissen soll? Was ist java denn Geschichtlich, mit nem Haufen Tools drumherum? Das möchte ich mal wissen. Und aus welchen Tutorials/öffentlichen Büchern über Java das hervorgeht. Also?

Google? Wonach? „Java Geschichte Dornröschen“ Fazit nach 4,5 Stunden surfen:

wie daraus ne Geschichte wird ist mir ein Rätsel: #ein winziger Artikel über das warum von java one-linern.

wo ist „Advanced Bash-Scripting Guide for jshell shell jetzt“??

jshell admin{Tutorial Reise durchs Dateisystem}

ok, die Idee ein jsh script pflegen mit cp, cat, pendants als jshell Einleiner nach und nach zu komplettieren. cd und pwd (gibts nicht s:)   und ls habe ich schon, Datei String auslesen, regex drankleben,  unit test an. und was noch? copy z.b. (;



Done it now radically göthestyle

Hi there, what is going on here:

I want to present my bildungstuff right from beginning to the end, that way that a keen found teacher is prepared to due insight as a standard:

So lets roll out here in the internet 2 or 3 pieces of problem, to earn enough for a basket of a post whitin a blog roll.

Well my notes say: 1. Driver program for Google API calendar, Bank A, Bank B, 2. gnuaccess process thread from installation and scratch 3. It says to fix and invent a harvester lines, log file, greeters, demons, for private issues, ok. Yes, and now, I note, that below the driver tasks are a dimension counted imaginary part of complex numbers scale: -j1. -j2 libreoffice API, named UNO, to dump to .txt, or updating index, or inserting a snippet of text. Another one is a

So you got exposed 5 fantastic tasks:



Test_LibreofficeUNO-„dump to .txt, or updating index, or inserting a snippet of text“


I will work at these, finding its, Test’s, highest coverage template, by whitin their docs, of demo hello worlds, fire them up, change and fire up again, keep results, a 5 times to get ready once, I mean. Even in best this it needed a careful liga-lexical observation, to determine, that is to deliver a congruent progress related usage policies. – which is supposedly of some effort.

Well, I forget to note that I am holding an general automation tool chain list, that a person Werner administrates, ongoingly filled, so we are working against this belt. Zauberlehrling at the very moment, right now? Ok? We did it Göthestyle today I praised it, right? For it liga-lexical congruent progress stage of a dominion one ordered for a well mesurement of its historic appearance, I got to have it in order, while these liga-lexical barriers did impact. What will happen, well 0,1,2,.necessary 100? I do not know?

So we dig in private.. notes a while…

import os
import time
from pymouse import PyMouse
from pykeyboard import PyKeyboard

import uno

: 9. Okt 2017 @ 11:17

Hi, then, I found it different in the end. You got to our three prominence points a round there, or one whole for them whole, you would be free to assume you yourself. Now. to help it on a considerable level of nursiness, not more, we see them attacker dilenquents right at the kernel of gnu regex high castle, training against the it the whole attackers crew since from a little decades ago, end plot templates stapling,: namely the fourties of the last century. Well you got prominence, in that it is port to personal publishing free by effective signal and local public police, wants to have forbidden, for being in anyhow to mighty: So a regex view on the in anyhow publishable data should be stand a to use. To speak about that here in my Göthebuilding course, yes, I deemed it came any way always to what not changed, so propose what? Yes, the producted, payable, rexeg training, a regex building at it. I mean as a general command? Cause: Like it is falsely, betrayed to be an attribute of so called Nerds, which is in so far not nonsense that most people had no fun with it without applying that is playing with it. It is, would certainly for some, to effort some for them to dominate and keep dominated a language that was designed for them, as for in human-machine any-human-speech-words-sequences-a-ware. So this is a building mission, aha? I need to say integration, ha ha. And 1940ies regex is still the best to use thats the spooky situation, not less, we will come up leaving some templates, with nobody intervention, thats all. But ok: Excursion about ones own regex building affordable state of the art. The development of the arts, pieces in form of lines, of my owns, which I deem difficult even I to read a time later. So I would not try to understand each, but I will harvester my own stuff, and well that should be all, and a well equipped driver mechanics novella garage report and. So they got in trouble, a Newbie Zauberlehrling, drops even, to it? I say as Serlo, let us collect we have castle on our side, and we have a prominence point endangering our culture, so most honorable among might be these the anti-anybody-soon-publishing-task-forces in might many cases. We do a tail, we got „a always sudden attack to gnu regex“ a castle, a figure it is driver, he knew another figure she named novella, and yes there is coming to flirt with him another figure Pubus and he was accompanied by his friend wait: Faschisko, Pubus wants to seduce Driver, Novella knows Pubus, about that, and also acknowledges Faschiskos presence, as if by Driver.  Yes, and as if someone thinking of an hamlet, you can use a Figure Reski, for a ghost, to reflect that you at an focally point for the severallity of prominence problems as by a but real world gnu regex fortress, these days. I had found that another tdd lines, 4, 5 sufficed it thread explosioin of my owns. So then I came back for a personal reqex self building person’s report recipe, a ware, ok?

Do 12. Okt 10:45:57 CEST 2017

It is namely about the whole upsetness at the irritation of the first moment, when revealing as shine falling through a scene, namely its bare risk effort a main issue. Falling to the scene, where everybody is astonished, that with this free little tool it everything nearly could be done better than with any later attempts till since 1900 Larry Wall (the tigers out „news“ right now?) now. What a catastrophe for him fascism to now, so to say, not to be able to overcome regex as for technical efficiency. The decades history of making use of an oh so growing shame, including nearly more or less everybody, no? That is everywhere they are working, they donor something bad competing a good they could preserve. It is all about that they lacked building and now should forward to re-force it, while kept real world unharming, in a requested novella production happening by the way hopefully, an integration effort. That would be a Figure Serlo bet, about this whole regex competitors reigns far out there. – Or should not we do better an opera out of it?

Is there a general gnu regex building general advice? I would ask?

So 15. Okt 17:23:56 CEST 2017

well, es always, I needed to have my fingers dirty in a driver stuff a while, to notice that what was lacking was insight, aka solution, happening there by: Doing something the göthe-style reveals problems of it proper format, happens an example of it, that is therefore processed thereafter by its own inherent methods. We talk of Göthe being a politician, so we brought it to the very point in feeling a Göthe’s policy in the perhaps the shipping style. No, that is all. You got a ware, it has its proper features, a list, where each portion of that feature list, is mining a solution handling of any source not in question in the first, let us have this. But: That is you have a certain cultural effort to save a 20*n babies‘ acute adoption and the burden of mentioning it. Its worthy mentioning goes a long with its mining, within the sense of common source software.

I will leave link when ready.




Beethoven fifth symphony first movement 2 pence

Hi everybody,

ultimately I found some teachings of Beethovens in my way. And the question rose among some: How is it, that or if the B5.1 is to be considered a the most basic piece of music, just like lets say Homer’s writings are for literature? How is that? I do not know who is up to mess up the signal badly, like some nazi musicologists secrets publishing policy. Dealing with music a wonderful healing or black hat skillfully sabotage any healing with it. To say what definite prominence after a first look.

Here they say that he kept shitting under his piano. Well, he could have gotten some of rudolf seats in some decent modern social system of those.

Any way I dared and decided to share my thoughts, even just because everything I found on this is not congruent with my personal opinion on it. They are for what ever reason false. Says I. In it is to say that I am the avarage musically skilled. Kind of newbie anyway.

So who is it:

Or was it this that I found in the library: Konold: Ludwig van Beethoven. 1979, S. 179. More over I could not find anything to disagree about his mentioning him so far, for example in Minima Moralia and Dialektik der Aufklärung.

Well, this was what I ultimately have seen and that was what motivated mine to post here finally.

Ah forgot: I took a book on abc or the like of musicology, you know students basics, and read everything at it and on it. This is easy, it tells you something that is obvious, but they order it for you.

So short introduction: Form of the piece, such symphony thing, is called Sonatenhauptsatzform. And that is where you got set directly on the throne of the master him self, I mean not chamber pot unempty below his piano.

I at least got some midi from theo internet, as well as the scores, printed that stuff to paper and had some issue adulterating this midi. This is what I truely experimented, even so I would not commit right now. (;

You got in a symphony 4 movements, each one of 4 Underparts: Exposition, Durchführung, Reprise and Coda. Each one of those has again 4 underdivisions: Among them them the main theme and the so called Sidetheme, an one called Epilog.

The last one. The second one is called I mean Überleitung.


I like to find that you got once more 4 divisions of each. The last one is typically name cadence, which is kind of harmonic flow. That is applied as ending of a devision. Where it make duff, daff, duff, daff, dozens of times and does not come to an end, end, end, finally end.

So you got that? The 4. Movement for example has 444 bars. There is a long talk about number fetishism and you could imagine the maestro, like the bbc pointed out as a free lancer, who served prospective clients at a position of need. He contributed his own Extrablatt. And yes time of his living he was tambien one of this idiots ready for being breeded out by impecable society. In other words he delivered, yes, typical market ware, as a survival bet.

Then furthermore what came out in the film is that they are hired to glorify military battles,  where man phantasize to in killing each other, so Beethoven hold this style. No fear for the maestro to have some ideas in the fantasy fighting each other out of that.

So, in the bbc report they told that beethoven was among the enlightenment people. And nothing; he perceived anyhing, kept his mouth bien shut, because of vienna secret antiterror police of this time and had a good opportunity to channel that into his music speak. Dr. Jänning could be satisfied so long.

That is, where dunno from whom, the understanding comes up that there is the battle of what mankind later learned to know as fascism. Anyway, B. gave it, the fifth symphony, the name „in tyrannis“, which is contra it.  And I am very, very strong relying on it, too, even though I found it only reported in literature not declared directly. Beethoven was a tramp, might be true, but- he knew one napoleon before he reached to power, then B. distrusted him, that is what wikipedia explained. So imagine, he reckoned up with him napoleon ex-friend in a decent (phantasy) bloody battle, too.

Yes, and what is said about Napoleon, these were just first and earlier exemplars of a Nachwuchsabteilung of let us say happening arguably enlightenment empowered, namely today’s industries, be it military or be it music. So we got to talk right in Beethoven’s not less most famous, namely the symphony movement one, let us have this as a focal point. This having them Beethoven and Napoleon posing, even presenting an however directed theater, to the public of their time, right?

Hm, then, in the bbc docu one professor said, that the conflict of the themes and the development of the conflicts is the heart of the piece. This true and key. They found 2,3 of the themes, melodies, in some pop songs of french revolutioners, viva la france, la liberte or the like. Maintheme 4. movement and sidetheme 1. Movement. It is to mention, that they above all were on search of the first motive: dadadaduu or even dadadadaa

Even though we need to concentrate on the 1. movement here, we want to find it the above stage, too. And in the stage above the above state. B6 for example has grown to 5 Movements. Now: Imagine, he was deaf. They found him writing on paper: „I am deaf.“ Let us assume he was totally deaf, when he wrote the fifth or before, ok? He felt first and even more then: he developed his work from pure math tune – at its heights, -which is tough admit for a consumer of his work. No joke, no wonder, Ludwig’s way, musics nature, human ghost’s nature, or not even the latter. Given contemporary -and eternal rules of harmony and composing, you imagine such piece unfoldment as a inverted card house fall together as a clockwork. Ludwig had his own engine for entertaining the folks, no question, that turns out to be – big deal- to be „the“ engine of music itself. Got that? One of this nuts thieves, but with deeply hate against corruption. Objectively seen with an infinite deep wish for incorrupsy if this is to be hold as a cognition theoretical thing. Well lets say B. should have treated his whores got, from whom he got Syphillis. But it seems logical that this man in this situation wanted to use a) a valve of what he was b) on fire- Let us assume that. Ok, lets, assume B. was even that leftist than Hitler.

So back to the schematics: He had to provide to those undign man eaters, dwarf praying clientela with fetish of 4 exponent 4 ware, within it kind of drama. So in the first first movement we got –

Well lets first divide the movements: In the first movement we encounter what is to be considered as fascism, the concept of fascism that lied buried in regular barbarism and got to flower with mass industry. It is what we investigate of it, and the conflict is irreconciable and effects horror. Next movement B. reconciles, Adorno explains this in MM with Takt, on a regular routine his consumers, with kind of holiday or hospital mode of the evelopment, cause no doubt the maestro will bring that matter to a solution, will he? He would. More or less you have per movement 8 melodies, but altogether you got per movement 2 melodies, set by the maestro, adulterating his default fetish production of his machine, the way how parts fall into subparts. So these melodies come back once and once again, hundreds of times as so called elaborations. Typically B. did, first diatonic elaboration to fill Durchführung part and then chromatic at Reprise.  Prominently got to Dr. Jähning for being lazy and fetishist betrayer? Yes, but luckily he is already dead. For example, according what I read in the Bild newspaper there have been 6000 of these cases in Germany a year. Picturing them do the modern breeding. Luckily they did not catch Ludwig shitting under his piano. If not schnippschnippschnippschnapp.  Hey, if everybody did as him that, where would we come to? The fourth movement is then something as triumph, but as well as duty fullfilling you got a fine conflict in it, too. How ever: 3. Movement is to be told a trio. I find nothing trio in it, he got the same 2 times 4, but then you find there within something disturbing as the professors noticed correctly. Kind motor saw roads. Yes, this is the fifth Movement, pregnant. Aha? Yes, they look as well anybody up, with kind of bad luck, but yes, if you for example publish opinions of arts. There is the contemporary case of this german Teppich-handler, who got hostile with a psychiatric medical at some local art discussion, and then needed to fight 17 years running away in these industrial propaganda landscapes.  Thank you. Hoo.

Ok, back to civilization, 3. Movement beats faschism. In the Reprise 3.1,3.2,3.3 straight, straight to the point, that straight that it is time left for this 4 parted embrio motor chain saw monster thing between, and it seems a little as a stress test for the new found communication engine: B. brought that motor chain saws pretty soon to harmony.  And then fortified, the found solution gets conveyed to or injected into the Triumph march a la france, alias 4. movement.

More or less, the high brow analysts failed in a few points. First one is to consider the rhythmic properly.  3.3 did the key rotation I said. I would like to demonstrate that shortly: imagine you got dadadaduu, ok? Which is the so called motive, everybody is upset upon. You got it from a beginning on, and as to be explained, it goes hitting you all day long by this path from the beginning to here. Ok?

Little history of dadadaduu development, first it came on short 2, short 3, short 4, long 1

From here is to tell.

and so repeatedly and in the cadences expectedly frequent long 1, long 1. between. Yes, that is, what one remembers of it all. As a early means against its problem, let us assume its misery it was shifted hardly perceived to 1,2,3,4 between: there in the cajon of one bar.  Bars series to the above and up and through the voices, the nineteen voices. Every instrument knows to say dadadaduu or groups of instrument keep saying tatataduu to each others. dadadatuu was replaced in the 2. Movement for another theme, while in the 3. reappears identically. Where the 2. movement was the hospital movement, it even got to host this portion brutality, now to the position of sidetheme. This is rarely sensed to dive up as expression of „proud“. Of Pride. I am not perfectly sure, but I mean the professors of the bbc docu had found this tune among his french utopists, too. So imagine even this supplicant to be niced up for hospitality reasons. Aha? So the first thing that incorruptable B. issued is to give it the second seat. There it stayed till its final. So imagine the situation! Requirement is that the two ever varying melodies find together. So what happens with dadadaduu is that first it is no melody at all. And: it is a series of notes of equal heights. So the next bet is: to keep it integrated in a melody of these proposed daaduudoo, any of these gay singer manners it gets instantly nazi with. So if there is a manner on having the nazi one behave and have them communicate or synthesis with each other, then that would not a thing, that would not be initiated from the nazi one, nor would it for certain reason of his character one that could happen at the instant or to say: fast. So what happens in 3.3 when dadadadaa is to be given earned treat: They start play with his structure. Next you see it dadadaa, to be sure there would be no melody that kind. But then on the first short da, you could enhance some from before, now? Got daadadaa. Hey I do not know exactly, if for some growth or mirroring rule they occur with dadaada in the pace of the play. When you put these nearby: dadaa dadaa dadaa, so you are at ddaa ddaa ddaa after all the diatonization already heard and daa daa duu and voila daa duu doo and vive la france once more that long. One hears that transition so sublimely, incredibly power freeing at 3.3 and 3.4 and I wanted to share that with my contemporaries. And correct, what they say about olle Lugwig. (;

So what has happened out of the eyes of fashism, that anybody could express his songs as he wants and the anterior limiting power or quality has been mastered. Congrats.

Wow, how I got into talk all that?

Well next I announced correction of the first_ movement. They say dadadadaa origins from the fate or the wind hitting windows. Blabla says I. As simple deeds test gives back. When did you hear in your historic, personal and there talking about music emotional experience the sequence 1,2,3,4. For example, technicians when they test load speakers. Where did we know the sequence 1,2,3,4 from I ask. I ask everybody 1,2,3,4, that is from times the sequence goes from 1,2,3,4 to 1,2,3,4 1 1 1234 1 1 1 1, whole day, whole time, whole life? The way the people speak for example to dogs: Do what I say. I will count to three. To be true people treat them self by this pattern quite often. And more than ever if „command“ is in game. It is with certain reason the technique of command. Like for example Canetti pictured it in Masse und Macht. Warn 1, Warn 2, Warn 3, 4 event of evil.

So, after a while, I kept finding this objective. So let us dump our recent knowledge here. So trying to start the whole Take from here. What happens in the first movement at the very first bars, let us see bar number 1 to 5. Hm? What happened in bar one to five seems to to obscene a thing. It goes: 2341 2341_ . Sing: – I am your boss, – – – – I am your boss – – – – – – -. This chant let us imagine to resounded by a twisty combo of the 6. There come full package of voices out of the strings, and one from the winds, namely the clarinet. Six having the the violins counted twice. So imagine afters this fifth passed, after having them six proposed, what did they propose? A command is the freezing in front of the lions roar, a technique of death applied to oneself, not less, so lets assume they six came 5 bars of our time in attacking, right? Right. Somebody told that with this first five bars the whole movement is already „seeded“, well following musical theoretical rule of processing. So we could hold on an ask at this point, and ask how should that taking place, and even how could it? Why wont it? Would it even? The only thing to assume is that we will encounter if nothing the sweetest melody, going slowly 13131313, something easy and lovely, in order to show up oneself dadadadaa mainstream arguable to reach to, when confronted to, subjected to conversation so to say. So bar five. What is to acknowledge at the height of a bar five, is that there is no rhythmic tension, to disturb such a command orgy, well little, as the number of the bar is five, and we suppose that everything is gonna be packaged, well fold, in two, and there out come four, we however set our ending to a five. To combine those to needed a 20 bars then right? Well we got however a I mean a 500 of it. So what’s problem? Well the commodious thing, the disturbance of a 4 to 4 packaging harmony, to mistake a five for a four, will then so to say evelop its disturbation pathogenesis through out the take. Lets remember the 4 and 5 thing for later. That is to explain, in a best bet to prognosis, how musical processing takes in the later and last bars of the movement. We should at this point introduce a new figure in the concept: Gummi. Gespräch. Modulation. Taktisch. Tanzen. Singen. Sing the into the other. Tactical modulation problem of at least to voices: We got a side and a main theme for to speak with each other. So we got a Gespräch. The movement consists however of threads of conversation, not less, to an end, to what is a so awaited, harmonically or tactically, solution. So what is to say about this famous movement, is that it would not anyhow find – occasionally –  a solution, but to expected to end up with an integratively incrementing a tension, however on cause of eveloping alternation, installing plateaus of a time window. Just the time span, when a ball thrown it rubber is stopped, somehow extended. But: You should pay for every moment that you live within the rubber, double in a surround alternating scheme.   So be sure, that in this art work as it is not to be assumed offense for his human consumer, every piece of dadadadaa will be left spit out, with a arguable effort, but leaving amounted  tension behind, as well a protest. So alternating out of the rubber, we got freedom from it rubber and a strong movement away from it, the stronger, the longer we have been inside, and we have been insight but a  na  a  long time last playing, so catapulting out meets what happens to come out as final. This says nothing about that this talks had not been found in anyhow notable improvements, to bespeak each in detail later. If you count a tutti on 1 and 3 an nine time subsequently an improvement over just 1,1,1.. come out in sooner occasion. How is that insorportable a one voice is screaming the only left other one down? Out here!. Eh? So back about what is to say on 4 and 5. If you see bar 17 now, you found the pattern 123-4 between them 2341 prominent since so long. So if this constellation gives up questions, the question if you tuned an already loud contribution till bar 5 up to lets say – full power? – would be then decided with bar 17 1234 occurrence, that happens to fall as a five tones pattern to an one.

This is brush stroked him Beethoven like a kid shifting a thing like a checksum by lets say 1, – after a 17*4 tones of boredom-, thing with which you got a whole disorder. The conversation between these two father 2341 and his first and only son 1234 is that dominant, the will to reconcile that prevalent, that its processing effort and volume easily explodes the volume of the container movement, while nearby it overrolled a any sidetheme twice. The passages of „2341 pure“ on the one hand and these of „1234“ on the other hand both growingly oscillate, while the number of 1234 gonna be inferior to wit, however a stronger growing from a later getting around to. At the height of a bar 17 the ratio is 1/17 and cutted at the last bar at 498, (was it not something like 500?),  right? Meanwhile seeking any water in the progress from 17-500, everything is overshadowed by this open conflict, and: this is to hang up here, being one of the main contributors that drive every tonage to the beat 1, that is what the music theory clock work outputs arguably shiny. It is that 2341 focuses in gather compensation with in series of (1—1—1—1…)*n on a transitory plateau (and to wit when the last tone get duplicatedly enhanced well to its very bar seat 1), cause „der objektive Geist ist das Verstummen“, Adorno Aphorismus Taubstummenanstalt. We are not yet there objectively. The other tendency to 1 derives from the fact that bass vamping usually goes to steady 1, so in this take. That is, to report is to that we found large passages in the piece, field that look like 1 1 1 1. mom: bar 190 till 250 for example: Is not that vast, a 12-20% percent of the movement go sterile tutututut, – and do we notice that under the loudness? In this case, this is to add this happened when putting on the side theme in the Durchführung. So you got it somewhat patched yet, at its repetition in the side theme of the coda once more. Well this is 17 here.

„One“ that is to add, because it is a my dictionary says: „vamped“ by a two base combo of Violoncello and Fagoti, starting from 7, just where the viola, did a solo answering in a conversation with these to violines the dadadadaa way. It is who after a 17 bars listening to it impostion, one disagreed child come between a bob the coin clockwork as for varying need. Well: if that had not happened by itself to bar five, from here indeed I would say the whole adulteration balance is hold in steady account: You got, I would bet, as many bars in the movement that contain 2341 pure, as where anyhow somehow is strayed a 1234 pattern against nearby. The latter, always if this happens cause amount of tension, that got no chance of a union, at least not in amount and pace procession of this symphony movement container.

Well and what more? An interesting task would be to picture each one conversation of them instruments and their building out of it according the theoretical tactical varying rules.

–>Damn I got a data loss a this stage.

-Well I talked about the sequence 5-17-20, the preemptive cause explosive and therefore destructive tendency of it dominant pattern, an usurper behavior of screaming louder to full power in case of any disturbance as shown to us before the subsequent tutti, first.

And second the sequence called flame, poop, metaphor for hope, oxygen apparatus, a production of an art work even, where a building of a three wind fagot, clarinet, oboe vamped the dominant pattern by a seven tones long sweet melody in the 1-3- rhythm pattern, before paying for it by a „catapulting“ at bar 491.


You could think of coins of behavior that normalized that soon are uniquely allowed in a coin machine of such design.

Yes, we found that.

 If  the coin machine is indeed a command machine and is without alternative, it could be a cause of despair.

Yes, that is deep despair, when the Oboe goes 295, starting the reprise, and mourning that the side theme as so little mattered and so little influenced, destroyed a former conversation partner in front of another, who took in mainly, el dadadadaa namely. And our relation to it, that its keeps destructiveness inhibited, alternativeless, surely at least for the volume of this movement.


Well here is where pain of despair pops up, swaps over, at mom 1.4.1. B. expressed despair on it and he hits the feeling of industrially pure percentage of people, in it.  So these high brow professors around are simply not free enough from their owning „command machines“, the governing tyranis,  to over come to that thinking stage.

So, whats more, shortly the story of the first movement. 1.1.3 Well after the commands fetish could present itself, its playmate had no chance for unfoldment. 1.2.1 No doubt in its glory went on showing off dadadadaa. It comes to what?  In Wikipedia they call it Klangfläche. Surely you wont deal with such a out-and-out proposal at all. So the beethoven clockwork breaks down communication with that uninsightful delinquent. 1.2.2. The signal that you perceive, and I go with the corinths is: breathing. Berliotz said: Breathing of death threatened. Who is per definition the commanded person. Well dunno if it is a dying breath first. Could be that, too. Yes. Every breath could be the last. This is fundamentally true. Then secondly dunno if B. had that philosophical reach, like for example we in these days of internet newland. So on that is to speak later, too. Imagine! There is that nuthunter with his clockwork engine. He takes a hand of the human songs sand into the machine together with a hand of propaganda industrial machine noise sand into it. And out come: Breathing. ihahih..   and then later ihhhahhh..  Sinister.

Without my humble intervention one could have hold B. the best address to explain the breathing. The production, kind of distillation of breathing. Even though he might not really have a theoretical  classification of such fetish, I would deem that he was possessed from a ghost, that conceived the ongoings. It would be recognized that they are possessed by the ghost of enlightenment. Now. Exactly. I knew, you expected me. With the undoubted godfather of enlightenment Leipnitz and Adorno we hunt them fascism out nearer. MM 151.S.1 These high brows lost force for it, and therefore failed to grasp the big picture. So there is where they drove wrong. In the monadology a monad could be anything, but a coin. A mon. You got any kind of mons out there. In the night instead of the sun, you got the mo on full coin once a mon-th, mon- mon-key.  And aham. And in the mon-ey you got man-y of the coins to.  Latin „Mens“ is not right a coin, no? Hopefully not. But what about a man, ha? Ok: human. What do you rest, if you strap away the coiny from him? Is that no labelled animus, breath or soul?

And at this part is up to ask, if B. was not augur himself enough among any ever namely Leipniz included, who gave a really tough, probably the toughes presentation against a critique of augurism, as his material system (of augurism), was approved by religious government, which were troubled enough by any concurrent augurs. Lately this augurism that goes along with enlightenment is as matter of expected superiority over any augurs around no less. If B, found his stuff randomly or not is saying nothing about the distance to an origin, admittedly at this spheres. Why not even hold him as self critical enough as Leipniz? Hm, B. needed to do his shit on the bet,  indign pressure, constant indign pressure. That his stuff did the hurdle is luck, how near is the hit then to keep someone away from wanting to understand decently that is functioning well without? This question is at least worth to be risen says I. I would not believe anybody so soon, but I feel B, should be clean at it for some evidence. In any case „it is not true“ that one needed to suspect anything destructive such as veritable hate in such a critique.

Then to follow the talk about the first movement: we got that heart attack or breath attack after shock with that fascism fetish: two times.  Well actually three. (:

I should shortly explain how I come to that number scheme. If for example you have 4 encounters of 2 opposite themes to handle, you got to adulterate a template with at least two places, not more. In the further pace you could but not necesarryly should lead the flow, I mean in B,s place, right? Every flow like for example the harmonic one comes from the unfold engine. You got cadences flows of accords at this quints circle system and you can check everything on the best wish ordered breathlessly well until certain region.  For example he put Cminor as dadadaduu main theme. So as he wanted it to clash, to run to the clash or whatever he voted for his sidetheme the Es dur ladder, which is something due wood way. Kind as if you required make a Chinese talk in his language to an English some syllables randomly from his vocabulary. Kind of monty python ungarian dictionary hurdle. So following the question of numbering the design rule follows: You have the first couple and need to fill places for three others out of them two? Si? Then take the third, the one in the middle of time distance, and repeat the initial one on a „pressed“ way „again“.  The reprise. We saw a through and through orderly reprise this time. It is to notice that by this tension, he let beam it in C-Dur. As if there where no Eschizzophrenia, apparent division, in it, but pressed with energy taken out of his neighbor time slices. There where flow is for recompensation in any how not repressed, which should equal: free. Number 2 and 4. Further questions? That is the nut cards of today.

The message: If there was a fight within those themes, to be happening first in let free forces, at least the result can be seen in an human acute breathing. A kind of survival strategy in such need,  what could that be? You get out of the breathtakings cause’s room, wont you? But, what? Wait. After having got out of the door, and the breathening has calmed soon thankfully enough and you are not unbrave. What? You take another nose of it, wont you, in order to measure in strength by its repeated impact. So you go in again: ih,ah four times. Enough out, with the wounded. But the space between the two battles is smaller. Even though knowing all that the second battle is unavoidable who ever wins what but with this outcome. Then from the epilog of the reprise you got drunken by horns and catapulted straight over some main themes place to: again march to the battle, but this time miserably long and with whining. Dunno which professor mentioned that B. even the most sceptics of romantic give in. So why that whining, if we have not around the pleasant maestro of for example the sixth symphony. What will happen to us? Again such an overkill? Well first measurement: If we need to nearly go down, then lets organize the show down orderly, therefore the length. And .. You could tease him a little by hopping from a beat to an opposite one for example, tickling with some rhythm alteration. syncopism. I mean they call that syncopism. So if they gonna torture us, one could come up with a kind of torture protocol at these cases and for later use. Again we fall at the break even into breathing but this time with two snap mechanism and only 4 times, I mean. And then really it comes even though to some – communication among them, but in scarceness of time stopped by some dadadaduu signals. Then at the final cadences of 5.1, of 12 time tutti or the like you got in the middle  of it interrupted by the presentation of the gain of that deal. 3 Notes played each one by oboe, clarinett and the other one forgot that, sweet as flute. It is just as looking the candle’s flame you could rescue after what ever a storm. It returns your hope. But hey, it was not true that we was not all sweating. Strange how by this music art one can codify a rather expected complex concept with mere 4 numbers? 1234.

Well, another thing, how is it that I endevelish the famous motive of B. The insulting the world wide marketed signum, as if I had bought it. Anyway what I wanted to express about that famous motive, can keep being marketed as famous. In my humble uncorrupted opinion.  Why?

This I explain like this. As he was like of a mind of coproduction for political propaganda arts stuff together with Schiller indeed, indeed him. He voted for rare scheme that could be, would be, should be seen as related with the accuse from the antiterror police against him B.. Seen by light these french singers are idiots, could not they play the game today I change my mind, without happening the big slaughter among them all concerned frenches. Sad, but not overseen out of false compassion embarrassing. Could not they learn to behave from their colonized germans or the like wikings? So the question keeps, why is he playing all the time this monstrous scheme in its passages. dadadaduu. 1234111234111111 and so on so playfully. Clearly because he is a little monster, as anybody could not defend he was not, I bet. I death threaten you once, I deathstreaten you trice sword juggling, what? Kant and Horkheimer were of the sense that despotism should be used, in order get to the monetary provision of a any human, that is the pendent of price of ware to a human, and something that human rights declaration came to support under the term dignity. So far the legal border and in so far not even necessarily extralegal his slaughter in fantasy there. It is our duty to respect the realm of fantasy being them consumers or their deaf composers. So imagine one of these sequences a value from 1 to 0 of death threat command property. What a sword juggle this might be, given he counted at an en tyrannis sequence within a mirrored form veritable commands, which corresponds on some avarage with a killed whoever, says I.  This may sound steep out of the piece’s facts, no doubt that he was one of the political kant schiller gang those days. There is a revealing paragraph on their intended revolution pattern, a template heap of dramas in MM 94. One could not say that with the same approach today they weren’t not endangered by prominence in most government/nations/countries  at different rating . Bets I. So message to the marketers of B: I do not know about lalala but dadadaduu I encounter even prominently famous.

These are my two pence on B5.1. I hope that someone could have use of it, when starting from cero to B1.5. Have fun. (:

Ps: I would like to express that I am yes clowning on schnipp schnipp schnipp schnapp other peoples sack, -ahem and it is not true, that Udolf van Beethoven has been send to sterilization for the judgement of judge Dr. Jänning, but I am not joking admitting that I found Dr. Jänning defense council appealing in that film documentation with Marlene Dietrich.






wget -q -O-|grep „udolf“

wget -q -O-|grep „udolf“
<p>wget -q -O- <a href=“; rel=“nofollow“></a&gt;|grep „Rudolf“<br />
&lt;p&gt;Der Hilfsarbeiter Rudolf Petersen berichtet, dass er aufgrund einer Anordnung von Dr. Janning &lt;a href=“/wiki/Zwangssterilisierung“ class=“mw-redirect“ title=“Zwangssterilisierung“&gt;zwangssterilisiert&lt;/a&gt; worden sei, weil er einer &lt;a href=“/wiki/Kommunismus“ title=“Kommunismus“&gt;kommunistischen&lt;/a&gt; Familie entstamme. Rolfe versucht nachzuweisen, dass Petersen geistig minderbemittelt sei und dass Menschen aus diesem Personenkreis auch in anderen Ländern, unter anderem in den USA, zwangsweise sterilisiert wurden.&lt;/p&gt;</p>
<p>The concerned in rudolf lost his egg film, might perceive a loosier relationship with a their coffee purse next. Well and yes, I might point to qemubureau’s Mudanca Policy on <span style=“text-decoration:underline;“>prominence aware, at prominence communicating tool production design</span> to be found on github these days, too. One needed one for the fields of providance, maintainance, publishing. Ongoing bets? Status quo of on going bets? Discussions around on bets on a server client scenario solution these days? None?</p>

basecamp; sikuli? I just wonder what has that obviously commercially made of design with free software to do? I picked it up by a videos. Google found some 6000! 6000 videos of this application, wow. And I have searched for it all the time and I was existing without me sensing that. Hm. Hello Paradise city, first.

Well I have by the end of the day half a dozens of private applications.

Well this can be proud anyway therefore. It is a hit that it stands on java. But now what happened to be deed that the horizon of user interfacing has grown in direction of certain scale. I would put a certain interim stage called: GUI decompiling language of a decent „gui decompiler“.

The point of privacy development here is simply that the user has no opt out against the programmers side dictate. Case of unbreaked hostility become commons and with it the need to have that poisoned industrial offering under quarantine.  This is basically human and rational behavior, and anyway will as a unforeseenly or foreseen insult take place in this theater.

But at this time nobody cares and they do not know which tools they got and run even risk to loose them again by maintainance negligence and or communication problems. I met one or two these days.

vncdotool got a marcro recorder. While sikuri has a image snippet orientation on the motor, powered with opencv, So you have to deal whole day long with any jpg snippet directories.

The heaviest problem right now is, to get in any how a overview about the use case cognition theory.  Do web work. Which are the templates around? Some how I have not the slightest idea about that society accumulated here. There are


-gamers, there are user interface testers, a few. There is the

-university develop-team, or

-one programmer, if not

-none tomorrow. They got

-private donators. (I am not sure but I guess you got “

5brokers“, anybody doing


-online business, not? But definetely not all, they needed to be those that existed as

-grey eminence but never talked on there decompiled gui experiences. Imagine a significant group of anonymus secret users, as it was clandestine. So they percieve it like that and do not speak about it: This is for

10 -parents to contact with their kids, I bet.

Yes and there is concurrence, with a similar approach, I bet, uipath, you can go there to study the feature list of what is in reach.  And ordered. They talk about so called „back office“ customers.

What do they do? They do the same as the gamers with there professionally even bought, but nevertheless harming, interfaces. So one should bet on grey use cases, on criminal use cases. The

-traditionally thought ( witch-) masters brainwash their apprentices in a regular discipline, being simply of wider reach. On ground of that templating: , well might be industrial uses dispersed in the mean time, I bet, and you know these Harry Potter Zauberlehrling Cult line production is do be explained sensationelly that way. These user classes need to be seen on scale to be friendly guides of the user, if in batman outfit, too.

You do the prominent torture brainwash with it were the prominent thought, therefore the hiding. – „back office“, a back office hand lens, huh?

But: there is no ! signal in the internet of such customers, they are by now not free software users. Ha, hui, aha, hm, oh, oha. Oho, aha. nana.


Question: So I search for the reason, how that comes and how the very circumstance gives feedback to the situation prestabled see: paragraph 80. There should be going on any sinister some psychodynamic never unbitter seen monad stuff, I would like to have a second voice on.

Question: Is there right now no theory/practice on decompiled gui interface automation around. I am aware   Christina Cifuentes , in a wider sense processing gui into script function by analysing the gui interface nobody came still to the idea, or is there something existing on that? How to find that out? Who could know? Mit providers? Maybe? Is there a mailing list. I fear there is not? Yes at mit provider there could be signal to be expected of that prominent matter. This got to be a real investigation milestone.

I expect from such gui decompiling theory the „coordinates“ of given gui and out of that first the naming scheme for my features. They gonna have a signature I imaging. Each feature, so if it not found out automatedly (some day), it should be registered by its finger prints in its ongoing ways juggling-mapping. 

At least it shall deliver statistical data for decompiling aids. Cause that is – unforeseenly I bet among brainwashers- is taking place: the decompilation of that gui hurdle in the users head.

I have application for it as prominently to read job data bases and prominently to send emails from a private email account. Well I said that I feel it grow to dozens use case applications to be found on the upcoming way.

I think I will do no other thing than brew my own home brown stuff together with siruki and vncdotools and put it under mudanca qa high stage any day survival toolkit tests. One and second make use of them in the database and email sending motor. So three test functions could be made out of having been posed beneath.

No idea still, what basecamp could do for one though.


google wonder sikuli gives this eventuality:

wget -q -O-|grep „magic\|demon“|wc
2 239 1481

A Congo Mother Survives Cannibalism to Save Her Children: Why Her ……/256405/
Diese Seite übersetzen
26.04.2012 – A Congolese bishop named Melchisedec Sikuli Paluku was one of the first to alert the larger world, broadcasting the story of a man who’d been …

„The aim of science is not to open the door to infinite wisdom,
but to set a limit to infinite error.“
— Bertolt Brecht, Life of Galileo

Users are not stupid, but usability experts follow a simple rule, „Users are
hard to refactor“. If you change a single keystroke, you will discomfit
someone, somewhere.

lets discomfit first!

Functional Reactive Programming

4.3 PhD Plan

Equations involving UI
elements are transformed into GUI-aware code using this interface, and we allow
usersto write low-level codefor those widgets or operations that are not specifi-
cally supported by our framework and interact with the rest of their application.

Aber hallo.


Sikuli – for all those hard to reach places!


intended here is Sikuli playing Angry Bird, if you are having issues with Sikuli installation, please see here, here, here, here. I did not see any recorder for Sikuli, though I saw references to one all over the web.

perprivateprovider usecases ca 20 android, twitter, facebook, dunno.

it only handled relatively simple cases, and it felt a bit like a science project (at the time, anyway… this was 2010). Good commercial alternatives at the time included eggPlant and T-Plan.

Sikuli: Automate Anything You See on Screen (
319 points by GuiA 176 days ago | hide | past | web | 65 comments | favorite

hyuuu 176 days ago [-]

I used this to automate my unemployment benefits, no joke. You have to keep reporting hours (every week I think), so I just set this up and run it, the closest thing I get to having a piece of software that makes money #sosad


1 Question to that. Where are your templates, then? Please?

2. You guys got such look as dollar signs ante eyes, that you loose the big picture in it? Monads? You got even speak something that is not possible to exist: namely the application as an offer to contract

(that meant freedom between the partners, which is obviously not given: You are better seen, as making the monkey on their commands, they threatening with a violation of most basic rights and basic fundamental need, and  you betraying eventually future prospective partners or the like thatfore, well, yes, that is btw, but should indicate you to fail to provide software for that, aha?

And are part of the problem at most. No less thank_ you_ for having prominently driven up to that point! Not less that the question could be arised here, right?

And investigating the quote comes with feature usecase experience guarantee. You got Time dwarfs of hours. These are passing the torture. – For you while you where not there, they got tortured were badly I must require for my private users‘ benefit, ok? – And you got Time dwarfs of weeks that to provides the customers‘ periodical delivery. Congratulations.

What I from the beginning on can not understand, how is to be dealt with prominence of that many so to see or so to handle and that for to define: torture times, T-time. By private business? Question mark? By ongoing private business around that. This is the official advice no less.

At this, it is not true that you need to deliver the hours reports, yes, now I understand they can check this while checking the validity of your product. The private communication stuff got dates … so the tale is that hours of your private schedule are marked as batman time, yes? Being that official legal requeriment yet or not yet. That is when you supposedly did swindledly sit it manually. -But again. We should even think of a so called partisan mode, kind of KZ-mode on that scale, lets assume a situation upcomming next for the user to be prepared to:

wget -q -O-|grep „Rudolf“
<p>Der Hilfsarbeiter Rudolf Petersen berichtet, dass er aufgrund einer Anordnung von Dr. Janning <a href=“/wiki/Zwangssterilisierung“ class=“mw-redirect“ title=“Zwangssterilisierung“>zwangssterilisiert</a> worden sei, weil er einer <a href=“/wiki/Kommunismus“ title=“Kommunismus“>kommunistischen</a> Familie entstamme. Rolfe versucht nachzuweisen, dass Petersen geistig minderbemittelt sei und dass Menschen aus diesem Personenkreis auch in anderen Ländern, unter anderem in den USA, zwangsweise sterilisiert wurden.</p>

This is droven in terriffic usecase mode, cause you will need a ressources and energy sparing solution, too. I bet. But anyway this ought to be a guaranteed must be use case, that is true.

Like have the user saying:

Dear judge, all I have to report from my personal case is that I was tortured at my hours time dwarfs stead that hard, you would wine. And on the other hand look at my production line, it is impecable. You got relatively little sorry to keep me living for another while, „man weiß nicht wie,“ 162 

From the projects point of view, one is to acknowledge that all the environment is full of ocurrances of so called prominence that one could think of a public or cooperative prominence server. If the claim is not to be secured against whatany prominence threats as a provider of such functionality, it feels helplessly incommunicable the help support to the publishing and providance effort, not to think even about maintainance.

A kind of hood handling market pops then up, right?

The concerned in rudolf lost his egg film, might perceive a loosier relationship with a their coffee purse next. Well and yes, I might point to qemubureau’s Mudanca Policy on prominence aware, at prominence communicating tool production design to be found on github (last paragraph) these days, too. One needed one for the fields of providance, maintainance, publishing. Ongoing bets? Status quo of on going bets? Discussions around on bets on a server client scenario solution these days? None?



is not such in the context of conditional welfare, „benifits“. To be true: You would have better spelled the name of Kant once, before falling in this.

3. Where are the templates? Why are they not provided, could not the maker imagine that a whole people needs to use it that very way? Instead that making a magic out of it? Some kind of terribly huge communication gap between him and some rational being.

4. Yes, and or simply perceived as: Prominent situation because anyhow anywhat threatening in it.  Even more to the Vagueness hurdle of stripping out the private stuff and publish. All together lead to that event explication.

Question: I needed to start a sikuli template not in reach situation investigation. If I do not find signal here. Ah, deep breath at the coda. 


fit2rule 176 days ago [-]

Congratulations. You’ve made Kafka proud! 🙂

critical sounds 1-100


got a first list of them tools


LDTP, gui aware??
Sikuli WYSIWYS-Tool
autokey google
tails #they shoul own sikuli templates
eggPlant and T-Plan.
self scripting vs sikuli

1 → 75 of 5702 results It is the forum. Gamers asking mainly.


I need templates.  Where are they? How is the file, the code file layout for typical personal production cases? And more? Yes. It is to remark that the mit secures one of our freedom as a gain of civilisation, as true prominent marker on a virtual grade of civilisation scale. And is hold up by the coffee pursue of mit for questions of prominence, by this time. Well what keeps one freezy however that there were no admittance of a „resentiment“ against this tool. Which then leads to critical doubts for long time support stable providance. Well this is kind of first impression of a newcomer.

How could it be, that I could not find from ahk gamers board to mit gamers board? Question mark?


I wanted to control the debian installation process on qemu once in a non X environment, being non root. I gave up, modelling myself compiling binary wrappers for suid root programs needed, such as mount something – in order to pass an argument. Well this is not even argument passing, it is more about altering the program. It is passing a boot argument. One needed to inject the argument in the boot loader and then rewrite the boot loader on a hard disk or a cd rom. But well there is no non root tooling for it.  Even so, it could happen that the distributor – for security reasons – disables the suid opportunity for compiled binaries as it has already happened for scripts.

I will opt instead for testing the installing with root as a first way out for this cicle.

But for the long run I leave a testfunction for later solution…

So well the second guess from the discussion about controlling such a – packaging – tool chain from qemu invokation to  oracle:

-it is a long signaling way, loads of code between.

-their are different j forms of redirects implicated: text and consoles (imagine what is that) redirects, and I have seen arguments redirects

-in other fields may be different the propagation of obfuscation, but in this case even though it is vast- it covers a great deal the history. The history of all humans alive. It comes enveloped with the history of security guide lines in computation – the answer why it is the common history of us all: it touches the os kernel, that is inherently unix, and certainly even though important: the hardware. Imagine! The hardware of the beginning era of personal computation.

Situation now :

A model for a user interface would be: You got some n log facilities around in the different k hierarchy levels and l chapters here and there. Lets classify these logs: sources. More over we have m some channels, programs that transport the logs.

One needed to have a little study about it.

Obviously there is no user interface design for such a thing, at all, maybe out of negligence. And if there is one, it is not favorable more a bullying hurdle run than designed between comfortable and healing, that is: something to juggle and to play with while eventually allowing to grow . One could think of a rather big confusion among any participants. The point is that they needed to afford a communication on those matters with each others then. Some channels are messed by security guide lines not any more understood, maybe. So if the speech is of a program concerning about that: it would have been in defunct state for the whole world for times.

Well, now, one could make a start of a „comprehensive user interface redirection chooser program„. As a pioneer one can propose a free software first step of a such designed functionality, right? Well then lets see if their might be opportunity!

So in the end: What does a user like us wish: any log source, put in by a jlkmn easy scheme to my log file, that is how the name of title is explained:  Test_interface_redirect_all_available_qemu-debian_data_to_one_file_scalable_with_two_variables. So there should be a table exposed to the user, about which text sources he chooses out of all.

  • Now diving into it: Which are „chapters“ on the signalling way, where as any stages are likely to mess the signal.

1) qemu – 2)grub- 3)linux -4)debian-installer -5)debian-packaging -6)xterm

  • What should include such a background study on developing a user interface for logging affairs of „virtualized debian installation“?

-Lists of j1 sources (thousands?), sinks,j2 channels (hundreds?) to be completed,

-usage examples of each,

-historic and security concerns of each,

-completion state to be integrated in the prospect user interface

  • A pointer should be debian-qa and there debian-jenkins mainly debian specific testing service.

Even though there is no competence between a qemuburo and debian-qa, they are in a similar perspective on such a user. I remember a speech about an overwhelming amount of log data to be delivered, and the lack of communication about choosing out of it imminent.

Question: Which is debian-qa’s practice/tactic/implementation and its theory/naming scheme/systematic for grasping among logging sources right now ? I could bet one could find an even more chaotic rather than communicate a promising comprehensive approach. No?

So how do they integrate logs?


qemu text output to a file


I would like to redirect any qemu text output to a file. (in a non X environment, connect to server from ssh and xterm)

## Test 1:-display none -machine graphics=off -chardev stdio,logfile=qemu.log,id=output,signal=off \
-serial chardev:output
qemu-system-x86_64 -version
QEMU emulator version 2.6.0 (Debian 1:2.6+dfsg-3.1~bpo8+1)
$qemu -hda $qcow2img -cdrom debian.iso -boot d -m $ram -display none -machine \
graphics=off -chardev stdio,logfile=qemu.log,id=output,signal=off \
-serial chardev:output
#witho .graphics
qemu-system-x86_64: Property '.graphics' not found
#without -machine graphics=off
$qemu -hda $qcow2img -cdrom debian.iso -boot d -m $ram -display none \
-chardev stdio,logfile=qemu.log,id=output,signal=off -serial chardev:output 
#it freezes the xterm, (pty, pts)

#from another on pty
kill -9 `ps ax|grep qemu|grep -v grep|cut -c-5`
sleep 10; ls -l qemu.log
-rw-r--r-- 1 t t 0 Nov 1 13:23 qemu.log


Workshop: How much mounted images after a fresh and raw debian 8 installation


sometimes one wonders about particular things, like this. From this lines below, I recognize only 2 lines proc and /dev/sda, the others bear all a story I would like to know sometime. It is an idea for a workshop…

root@ahostname:/tmp/qemuburotest# mount|wc
 24 144 1898
root@ahostname:/tmp/qemuburotest# mount
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs (rw,relatime,size=10240k,nr_inodes=28938,mode=755)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,relatime,size=49640k,mode=755)
/dev/sda1 on / type ext4 (rw,relatime,errors=remount-ro,data=ordered)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,release_agent=/lib/systemd/systemd-cgroups-agent,name=systemd)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset)
cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct)
cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices)
cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer)
cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls,net_prio)
cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=22,pgrp=1,timeout=300,minproto=5,maxproto=5,direct)
mqueue on /dev/mqueue type mqueue (rw,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,relatime)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime)
binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,relatime)




rally on launching useradd added user with X-server 2016| tee „medicalreadme“, deb jenkins preseedfiles

Hi everybody,

well orchestration of process xy: the yes-launch wrapper

in out recent podcast we try to -lets imaging just for entertainment- give you a some meditation about chasing a user’s account to X. Normally one can swear in the end – this will be end up bad, – in the first attempt, in the second and in those that could or should happen, right? Considered the underlying security policies, some how hiddenly, secret but existing, effective enough to be regarded, to say important. Well the point with my person is, that I know, to say I once knew a solution of these. And just for a „tanteo“ I walk out for the internet to – narrate. Ok, back to the question: So in reiterating already more or less successful -(in question having learned for the second time, e.g.) process, to say working steps one looks out typically to have the usage well orchestrated. Right? So what about testing about how a normal user could or should do? Is it necessarily that hard? Question?

Answer: Yes. It is:

See here how I had to rally the Google searching machine to find the relevant Information! Just the parameter display in the finale searches gives a relevantly filtered and sorted set of answers. Note that I was each step vague, that is expecting with next bet to hit,I did intents to 12 times, that is near the border of frustration, right? – and in the end I came through having found the name of the environment variable whatsitsname. Cause it is exactly, exactly what I should have learned or remember. There was a bash environment variable. A environment variable is a term from the bash – linux?- yes let us say environment. These problem is another rally of lock picking in the end. (On ubuntu you need to have not to come around a file called Xauthorities to be testifying your insistent will of launching that program, yes, yes, yes, once more yes and , yes having sayed yes enough times. „Yes launch!“ could be the, a name for a – orchestrated- program, a yes launch patch („patch“ is the relevant term, is not it?), filter or wrapper, snapping out to be put on the feature requests lists of whathisname. Yes and „on the way to to an „Yes-launch“ featured  X wrapper“ would be the name of the post? Right? Well I could drop at least some pseudocode staged work. No?

12:31 PM
linux user without display environment variable - Google-Suche

12:30 PM
user without x - Google-Suche

12:30 PM
bash environment variable for X - Google-Suche

12:30 PM
bash environment variable for X-server - Google-Suche

12:29 PM
bash "X=" - Google-Suche

12:29 PM
"X=" - Google-Suche

12:28 PM
linux useradd graphic with "X support" - Google-Suche

12:28 PM
linux useradd graphic with X support - Google-Suche

12:27 PM
linux useradd graphic - Google-Suche

12:27 PM
useradd graphic - Google-Suche

12:26 PM
bash user "without x" environment variable - Google-Suche

12:25 PM
bash user "without x" - Google-Suche

12:25 PM
bash user without x - Google-Suche

„the hassle explained: the birth of medical hint readme file“

You know why that all here? I just wanted set up a Document to write about the user interface of the, the preseeding machines on earth. The picking process can be imagined as „hassle“. It is a situation prevention against gain. Who is on the both sides is difficult to say, but there is more then play, there is fight. All barbarianism comprised since the myth of homer, attached with the good reason box against the someones different. I personally believe that the trick is, that ordinarily in a yesterdays might-be dragons, are probably not that effective anymore for the now. In other words the not having a of well orchestrated product for that, is therefore not necessarily bad will. The vagueness could be overwhelm, could not it? Any way, if this turned out to be question of a „review“, „dossier“, one could see the orchestrated ingredent the question of – another french word- prominence. It is prominence I guess. Well nothing else than a kind of today’s dragons stuff basic material. If this thing, this wrapper, of what is the speech of, is having a User interface for it, then there is ontologically seen, another human in game, – in a game where some of the humans, participants are criminal against him, types as him, specially against his intend of being integrated support part. So a user interface in a first and early conclusion needed comprise the criminal history of the intents against it as a necessary soft skill, this, in order to keep chance open to understand itself at all.  The cabinett hurdle. One could address it like that, but how sounded that? What about „prominence cabinett hurdle“ as a must-be-in-part of a user interface orchestration of any free software, any responsible free software? Well, in conclusion it is to point out, that free software in its core process is in a defensive position, when it comes to the efforts of privacy guarding. So it shall criticize high efforts to be charged. Their  is a rejection present to the take part in the battle against market access rights of humans, masked as prospective free software contributors. Which could by the way be called „cabinett NeWs“ of 2016. Some decent traits of being dragon swearing detected in the representation of free software rights, mark the domain of such a dragon in nowaday’s thinking.

So be aware that we tell you a new version of the criminal history in it and its explanation on it, and those you are supposed to be to what ever degree infected with and yet relying on. Any user should at some early point should test himself of being able to maintain himself by the together-relevant explanations and criminal history. Background: The narrative schisma is expression of a personal schismas derived from the enough-being-effective of its own phenomena. Now it comes clear, that the program’s exposition should do something „good“, something „healing“ even to the stage of medical realm. One stumbles all day with yesterday’s idiot crimes xyz and is getting set to so to be responsable to cases to intervene that far at least, if it is relevant for healing affairs. Well there is a need to point the user even in the license to that.
User23.445.332.944: Administrator, administrator help me!
Administrator: What?
User23.445.332.944: When I read you programs manual I experience myself as somebody that I have become crazy for some time?
Administrator: Have you read the healing hints of the „medical hints“ chapter?
User23.445.332.944: If feel diagnosed ill by it, so how is the situation about further coexistence of us two, and of it all?
Administrator: Have you read the Writer-User glad enlightenment“handshake“ thing in it to follow on?
So in Consequence (once more): Results of this: -request two last  paragraphs as medical hints readme-file between an any user interface documentation, intending to supporting the anyhow privacy guarding. Some kind of WHO illnesses catalog among, for those having got Monad , well, take this one at second paragraph sentence 1-3 for being urging to capture the imagination of a monad, qualified by „The concept was later adopted by other philosophers, such as Leibniz, who referred to the monad as an elementary particle“ equalizing a human no less.  Such ones as a any kind dragon swearer contributor of it namely for example here. We can not look upon that we a have always tons of them to be motivated somehow, to much to look upon the per visit count of the user interface. Some of the users could be got a kind to called reality shock, historic culture shock, well within the realm in which the program user interaction is intendedly to namely enlightened use and in any question rightful there. So one tackles with in a situation which can be qualified as: among ill. The secret of the situation is: Nobody knows that you, we all, are among ills. Intersection found: Group of criminals supposed to be there doing or having done the business of making use of the dragons technology thesedays xy unsolved A and Group of medically to be clasified ills, Dragonsswearers. Well es a first remedy and to the first newly caused effort, that is affront barbarism, set out in a sentence such as: So much have be meant to offend, insulted, libeled, even the word violated, got that from the dictionary for „beleidigend“ with that.
One can reach out for hand shake by:
-„for civiccooperation it were a being favorable of having phenomena from the monadology matter the most dealt with,
-something already supposed to included in the present private contract „as is
-and at it, signalizing that for explicit communicate it is needing time presently,
-from time to time, yes, too,
-instead of being even for a some kind of reason to dull for namely it
as in a „first moment narcisism“ patch,
-but as formulatable, well, a „as is“ agreement offer, a handshake.
Reading it yet and here, I deem thiiss „handshake“ thing recently written to be included in „medical hints for regressive users story“, right? Asked to me? Answer: Yes, do!
So having come once to the question of ontology and Monadology : Who is us then here in the game. We, yes we got an outlinedly sublime position in it. We are as well monades, – but ought to be in best case, hope to be labelled: as god monad. If questioning yes or not, one is to be forced to yes in the end of the day, current date, coordinates xyz in the present world.  It is not said that we are it, but we integrate to it. That I am prospective ingredient of such a good in the world, how not in world, set that one is one of those after the good, in any case not in any respect willingly evil. What ever we do, after overcome terrification, right? – it is to notice that there is medium around our doings that give them special impulse. Our, (the user‘ and mine, let us call it friendly) signaling to neighbor monads is out of a special substance. On the procedure of the happening happening it has first high effect, higher at least then thought, if of its effect could one have an imagination, at all. Well let us suppose of an imagination such! Within such society the users monad with the developers, the offerers, publishers of free software monad?
User23.445.332.944: Am I right if I label the sentence as agreed up: It is in the user’s profit, to get social with his free software  administration that far: Is my behavior here and now typed as important, as responsible for that effort, that consist of no less an occasionally or might be even criminally caused effect that discriminates, anyhow sending signs of endangering and threatening developers, especially then when they are kind of free software pioneers in a free software blind market segment and: at the time of following these his profites he will do nothing else than a big, could be biggest contribution to the whole to it?
-So imagined out to the few of the free software user their is a signaling of good within this signaling toolbox wares, it is likely the voice of sensibilite, quite holy in the instant, yes, and it stems directly out of the user’s software’s civic own private home workshop in the instant, too, in so far it is his problem.  The user’s first bet would be, if the devs could reach to compensate effectively any might be barbaric events at it or not? Often enough, however,  one might suppose this to be unfortunately not the case.
-Well, for good reasons I better gonna turn out to be the best „filter“ design for all anyway industrial „hell machine“
(well I this term needs clarification in a civic text like this, so the clarification providing answers straight here, find the existence’s mentioning of such a „Höllenmaschine“ there suggested once, go find it lately at Aphorismus 149, „Halblang“, at an orchestrated works passage 149 out of 159)
signaling against my tool’s development, one could think of.  And: Not to swear or stop swearing, comes with that to stand, that it is but sworn around one human, is hard a time for that human.
Admin: Ok. Phenomena like this could happen on the user interface.
User23.445.332.944: Seen it that way right: Best statement about devs: it is of most importance that they are let in peace thought of any case of questioning of such a subject; a fire man user could contribute constantly enough such to those, who are due to take part for any reason in the „discourses“.
Admin: Ok.

Back to the original problem whats about all the xauthorities whatsitsname?

So, third chapter of this post, will I soon have a key xlaunch? Question? Hm, there is solution for ssh relogin present, but nothing for to run: su root; su user3; startanx application such as libreoffice for this environment.

Can a userthread such as „su user; run xclock“ use the presently running xserver?


user1:/$ su user12; cd
Password: user12:/$ export|grep Xau
#declare -x XAUTHORITY="/home/user1/.Xauthority"
# well it is not connected to ones own file but to that of the neighbor user we a have been before. We decide to point this pass to our own such file. 
 cd; export XAUTHORITY=~/.Xauthority
:/$ export|grep Xau
#declare -x XAUTHORITY="/home/user12/.Xauthority"
ls -l ~/.Xa* 2>/dev/null||echo "got no such file sofar"
touch ".Xauthority"
#is that correct, what kind of language is that, 
#I remember of having known it. So which?
#No protocol specified
#Error: Can't open display: :0.0

If you must do this, at least do „xhost +localhost“ to avoid creating a security hole larger than you could get an elephant through.

Even better, enable X forwarding in ssh and do „ssh -l root localhost“.

This means that it is deprecated to use another users account not over ssh, you see. The late „do ssh!“ sign. If I did that I had even more trouble with other security files around.

using ‚xauth‘ to obtain a magic cookie from the owner of the Xserver, and placing it in the ‚cookie jar‘ (a what?) of the other user—see „Remote-X-Apps mini-HOWTO“

target user has a „restricted shell“, has he?

xhost +localhost #has to say, who when? #does it mean anyhow restart X?

user1$ xhost +localhost
localhost being added to access control list

export XAUTHORITY=~/.Xauthority;cd; touch „.Xauthority“;xclock
No protocol specified
Error: Can’t open display: :0.0

We see, we come not through, if an solution had been existed once, it could be prevented by a security human meanwhile? So which are the facilities to debug it, then?

They say their lived a X access control system, with six „mechanisms“# so what is about copying other people’s magic cookie?

One notices: That fullblown with sec stuff, that all question of usage are side streets. So then I need to steal the .Xauthority  MIT-MAGIC-COOKIE-1 from it jar? Hello? And next moment I find my self being root in order to debug security issue infected systems, question? There we go. Well, lets see if we need root?

ls -l .Xauthority
-rw——- 1 u u 178 Sep 20 14:26 .Xauthority

The answer is yes. One needs to be root. Actually one is to urged to become root or alternatively to do manual password entry each time for any debug kind testing of a  system, one is urged to endanger oneself just for using a free software in a use case that is unrecommended.

Well you should think of it as a two arms solution: first root does; once a session what can only comfortably done by him? Ok, he needs to be called once by session to spell:

sudo cp /home/user1/.Xauthority /home/user12/.Xauthority

sudo chown -R user12 /home/user12/

Then from another xterm – X-terminal one logs in manuallyonce per session once more, that is besides the one just done, by switching to root once per session.

xhost +localhost

su user12


export XAUTHORITY=~/.Xauthority;cd; touch „.Xauthority“;xclock;

#xclock appears

Fazit: The most comfortable solution of operation over the su interface consists of mutating into two, pardon thee different types of users. So you have no, should_ be let with no other option then typing in password. And it is true you are led by doing it through the ssh interface, when automating, Cause it offers a once in live key exchange, between the accounts. I vote for that a unlock-to-x wrapper should be implemented over the ssh library, in any case.

The unit test for it would be: Test_X_for_prospective_user_ready_on_generated_or_present_root_vms_including_non_interactive_ssh_key_exchange

Implementation probability in qemuburo: High, next …

But even with that late errors and not functioning status.

soffice & # xclocks started, but does no sign malfunctioning soffice, meanwhile leaving everybody wait to timeout.

libGL error: failed to open drm device: Permission denied
libGL error: failed to load driver: i965

#so more magic cookies even.

Comment 18 for bug 1302270
Daniel van Vugt (vanvugt) wrote on 2016-10-06: #18
Danny: This bug (bug 1415104) was marked as fix released on 2015-02-02. So if you’re still having problems please log a new bug.

I can already tell your problem is that the login hasn’t set correct permissions on /dev/dri/*. This is normal (not a bug) for tty logins, but should be resolved automatically with graphical logins (lightdm).

Please log a new bug here:

DRI? Dirty Rotten Imbecilles? Hm, there you get still saying to use ssh loging for a whole set of graphic applications. What nobody as known nor shown from the beginning, that it was made impossible or at least is in a impossible state the original plan of running X that way, this little fact nobody mentioned to the searching user. And that is a treatment that seems not quite: fair, not to be warned of something time consumingly upcomming bad. This could be, even, a bug on an side street interface of the distros X setup, half intended. Aha, aha, aha. (; Well, in our case it gonna leave with a good solution from it, because me, in little time I will end up implementing just ssh X unit tests, do not I?  I will follow my original usage case by using user1’s account.

Then, there is no way to obstinated on starting an x-app, no? So we go using the root cp file file2 method plus the „chown tatata“.

debian jenkins system

Now by the way, user interfacing thinking and travelling the rally tour. It pointed me by storm of odyssey to debian jenkins system, which I discovered. I went to preseeding.cfgs to do some statistics to learn from: Test_for_any_of_86_command_take_from_any_of_77_preseding_files_the_overall_hits_coverage OK

Test_for_any_of_86_command_with_in_take_from_any_of_77_preseding_files__the_hitting_files_list_per_command OK

Test_for_any_of_86_command_with_in_take_from_any_of_77_preseding_files__two_example_of_either_group_to_show_up_at_per_command OK

So: Conclusion: How is this done? Doubtable in bash, complexity higher than 0-dimensional variables and two for loops. If, then using templates, which are not there at the moment, at least not an extended. And one should have one.

-With respect to: magic-cookies for anything in Code then, IFS?, Arrays not recognized in arithmetic operations and overmore having monstrous names such ${indix[$index]}. A way out in this is to create filegroups from the templates, to stay down the complexity level of one for-loop.

mkdir ./, git clone git://; 

cd ~/
for i in *; do grep -v "#" $i>$i.strip; done

ls -l *.strip|cut -c30-33|sort|uniq>16sizesuniq
cat *.strip|grep [a-z]|sort|uniq>actuallycommands
for i in $(cat 16sizesuniq); do echo $i; cat lsl.out|grep $i|tail -n 1; done|cut -c48-|sort|grep [a-z]>filenamesof16
wc -l 16sizesuniq filenamesof16 actuallycommands 
# 15 16sizesuniq
# 15 filenamesof16
# 86 actuallycommands
# 116 total
#create extract of 16 files
for i in `cat filenamesof16`; do cat $i|grep "^[a-z]"|sort|uniq> f$i; done
wc fdebian* -l

# now hour of truth: there is easy way from file to variable: IFS
IFS=$'\n' read -d '' -r -a i < actuallycommands
echo ${#i[@]}#86 #his length, how ugly, ugly, is not is?
(for ((a=0; a <= LIMIT ; a++)); 
 do echo -n "";#Einwantnuts"$a"_"${i[$a]}"_;
 #echo "${i[$a]}";
 #grep -l "${i[$a]}" fdebian*
 i10=`grep -l "${i[$a]}" fdebian*|wc -l`

 #echo "eins von den ja files"
 i11=`grep -l "${i[$a]}" fdebian*|head -1`
 #echo "eins von den nein files"
 #grep -l -v "${i[$a]}" fdebian_sid_daily_*|head -1
 echo "$i10" "${i[$a]}"" " "$i11";

 done;) |sort -h
#|grep -v "15 "|grep -v "0 "|sort -h| grep partman
# so if you need partman support?
#grep -v 15|grep -v 0_|wc # after 64, around 20 commands in any file (or none) 

# just for sake of complete ness this
count=0;LIMIT=${#i[@]};echo $LIMIT;LIMITb=${#i1[@]};echo $LIMITb;
for ((a=1; a <= LIMIT ; a++)); 
 do echo -n "tell me wich filei1 ${i1[$ab]}";
 for ((ab=1; ab <= LIMITb ; ab++)); 
 do echo -n ${i1[$ab]}"____"$ab; 
 #grep "${i[$a]}" "${i1[$ab]}"
 # >/dev/null||i1_hits[$a]=$((${i1_hits[$a]}+1));
 echo stuff"${i1_hits[$a]}"_"${i[$a]}";

So we got it, in conclusion we got an overview of this: We have some errors around  truth 10 sluggish leak commands not found at all,  50% are used in every template, 20% more than once.  You got to most commands an exemplar, no less. Fine then.screenshot_preseed_tables_of_mine

So well, what is to comment is,

3 d-i grub-installer/bootdev string default fdebian_sid_daily_gnome_speakup_preseed.cfg.strip; so that says that they are busy testing „speakup“ the audio, aha, interesting to look up the code, reinventing wheel thing is were prominent: „lock picking hassle“ is done here, next comes X, X-window manager, no? How difficult would that be, to distract that info for the existing jenkins system? Why the hell swap something easy with .jaml? jaml.

4 d-i anna/choose_modules as well with moderated average. Anna? Here for example: fdebian-edu_stretch-daily-netinst_combi-server_preseed.cfg.strip

1 d-i preseed/early_command string sed -ie s/tty4/com0/ /etc/inittab ; kill -HUP 1 fdebian_sid_daily_hurd_lxde_preseed.cfg.strip
1 d-i preseed/late_command string apt-install xdm epiphany-browser ; echo /usr/bin/xdm >/target/etc/X11/default-display-manager fdebian_sid_daily_hurd_lxde_preseed.c

#funny with hurd late, early each 1, no less.

netcfg/choose_interface eth0 or auto, netcfg/gnetcfg/get_domain string intern or  unassigned-domain, netcfg/get_hostname string tjene or string workstation

That’s how they configure their network. Well it is calming to know, that all these commands are in order, no? So, if this is the news of the day from it:

Way to learch preseed API free.


debian jenkins system 2

So there must be all tresoso of picking done in this


„jobs“ templating. Jenkins „jobs“ which correspond on the python scripts, qemuburo is

out of.

So there should all „by-passing maybe security“ skill in that, maybe a history of it, within debian-jenkins ppl.

I need all parameters on the code concerned.

And Test_do_find_the_execution_flows_to_X_entrance_Or_X_install_making_noise_Or_User_X_login_

FAQ1: Are that scripts called „Simplistic“ Debian Jenkins, jobs, any readable and – retransferable to python Unit tests?


│   │   ├── images
│   │   │   ├── DebianLive7BootSplash.png


├── cucumber
│   ├── bin
│   │   └── run_test_suite

└── userContent
├── images
│   ├── debian-jenkins-24×24.png
│   ├── debian-jenkins-24×24.xcf
│   ├── debian-swirl-24×24.png
│   ├── jenkins.png
│   └── profitbricks-24×24.png


ls -l|wc
20 173 1498



/$ ls -lrS|cut -c43-

 594 Okt 18 03:59 Makefile
 1785 Okt 18 03:59 edu-packages.yaml
 1887 Okt 18 03:59 dpkg.yaml
 1993 Okt 18 03:59 self.yaml#?
 2054 Okt 18 03:59 d-i-overview.yaml#?
 2655 Okt 18 03:59 debsums-tests.yaml#?
 2723 Okt 18 03:59 udd.yaml#?
 2839 Okt 18 03:59 haskell-package-plan.yaml #?
 2884 Okt 18 03:59 packages-tests.yaml#?
 3153 Okt 18 03:59 lvc.yaml#?
 ___3366___ Okt 18 03:59 live.yaml <---- ok, this is interesting
 4049 Okt 18 03:59 schroot.yaml#?
 5003 Okt 18 03:59 piuparts.yaml#?
 5203 Okt 18 03:59
 __10465__ Okt 18 03:59 torbrowser-launcher.yaml  <---- ok, this is interesting
There should be hopefully the path to be found where there should be juggling, hm?
grep "\.sh" torbrowser-launcher.yaml |grep "/*/"|cut -c24-|wc #4
1. /srv/jenkins/bin/ torbrowser-launcher torbrowser-launcher-{dist} {dist}{my_prefix} awesome dbus xterm x11-utils x11-xserver-utils feh libnotify-bin figlet build-essential fakeroot devscripts git-buildpackage lintian python-all debhelper dh-apparmor lsb-release iceweasel ca-certificates{my_postfix}'
/srv/jenkins/bin/_____test_torbrowser-launcher.sh______________<-this one ................................

/srv/jenkins/bin/{my_opt_arg} {dist} git'
/srv/jenkins/bin/ unstable git merge debian/sid'

# 2 scripts found, one of them launched with several use cases.

 14614 Okt 18 03:59
 15187 Okt 18 03:59
 16661 Okt 18 03:59 g-i-installation.yaml #?graphical debian installer?
 39569 Okt 18 03:59 reproducible.yaml#?

du -sh .
852K  #1 MB Skripts? and Pictures!, reading, hm?

ls -lrS|cut -c43-|wc
71 #in kind 71 Files

bin$ cat |wc -l
817 #around 800 line this time? And then I get a main interence in them? main function?

grep -A40 -n „# main“ |grep [a-z]_[a-z]|grep download_and_launch

cat |grep -n download_an

cat |tail -n333 |head -n230>download_an.txt# two hundred lines


cat |grep -v „echo\|#“|grep [a-z]_[a-z]|grep -v „update_screenshot\|announce_problem_and_abort_silently\|prepare_lauchner_settings“|wc -l


Finding: „ffmpeg -y -f x11grab .(Xvfb -ac -br -screen 0 ${SIZE}x24 :$SCREEN &
).“ should be the technology how the do the screenshot, seemling the got even „film“ usecase handled , no idea where is the corresponding oracle ..


The function in small words: schroot is invoked 3 times, prepare_lauchner_settings this will make torbrowser screenshot-ready.

grep -r „oracle“ ../*|wc -l #0

schroot –run-session -c $SESSION –preserve-environment — mkdir -p $HOME/.config/torbrowser

–preserve-environment — /usr/bin/torbrowser-launcher prepare_lauchner_settings() sudo cp -pr README INSTALL TODO CONTRIBUTING d-i-preseed-cfgs /var/lib/jenkins/userContent/


bootstrap_system() {boot_system, qemu.–

Fazit: I do not find how in debian, jenkins bin, where are kinds of „oracles“, I know from python tdd and where they do they postinstall-boot „xdm lockpicking..  (

well actually later on this came:

# Copyright 2012-2015 Holger Levsen <>
# Copyright 2016 Philip Hands <>
# released under the GPLv=2

This seems to be the actually,

point of time meant by the word now,

elaborated to be „enlace“, for the happening of around 1000 heavy per time slice testing runs take place time, and I did not have found it myself, but was pointed to. One could find this things out on a systematic approach by using local git. This should fall out as heavily committed ultimately then.

To the question of oracles, the concept, naming scheme of: oracle is new to them. – Maybe it is the oracle trademark threat behind, these day.  On

, that is on line 1084 you got the oracles all, and one btw. sees how their (g-i-installation) testing is taking place: they do a screenshot and ocr it with gocr the line before, two lines before they issue key presses with vncdo, -there is no package of it- they need to download as  foreign, an strange, an external, an alien, lets cose the word: exile package from any github around.  Ready for that news? Debian is using for its own purpose, namely for the purpose of its own (test suit’s software) testing, a package from its own repository of any 100.000 packages in question? Looking out for effects of swearing that is self damaging brain wash, one finds immediately: They are any more not even able of integrating the tools that are they using for them selves. Is this brain leaking? A brain that leaks? Yes lets take it that instantly! It is symptom of mental hostage around the phenomenon of x-automation software these days. Asked me what do upon, I would deem, I would not know in consequence how to handle that „secrecy problem“ then in the future, but I anyway contradict sharply from the beginning agaist any human harmful practice, in this case at first our developers.

you got:

Then this:


hi, any small talk about the code? and the potential off technologies integrated in and such as
(Well, got banned out soon, offtopic: definitely they said ..)
vncdo -s $DISPLAY key ctrl || true
convert -fill black -opaque $VIDEOBGCOLOR snapshot_${PRINTF_NR}.png $GOCR.png
gocr $GOCR.png > $GOCR

vncdo, please which kind of program is this here existing along the schisma of the centuries? „vncdo“. Hey, come over. Yes, wait I first need some „vncdo“ before.‘ There is quite joke in it all the time over this case-historic impact. „vncdo?“, no „xautomation“, orphaned? AHK, what was their name? Windows. Windows offers freedom. AHK. AHK.-AHK.

How do they do the treasury picking then: with vncdo, they issue a pair of virtual key stokes to lightdm, do no what dm, here lightdm, lets assume the former, so this maintains the greeter’s screen physically visible for a physical user. Having achieved that, they do a picture, or even a film of that .mpg, to some preparation to feed it then: to the ocr machine; in its output, they search oracle’s text strings, originally to be read from the user dialogues. That is what I was after, thank you, everybody who helped me on that path! For any amount of sophisticated technologies I was looking out for, it seems that there nothing more or besides it. There for example I was pointed to, that there was no testing of sounds. X-manager break in turned out to wide open to private owner front door at lihghtdm era,

Open questions however left:

-Are there really no other tools for „lock picking“, such as those, that move the mouse pointer or manage a graphical programs user interface such a graphic webbrowser used? (Take in mind, that this is for nothing an idiotic question, not to be confounded with a question pose to mere idiots, of which could happen well case of, but is there something more suspicious than being too early offended by exactly this?)

-How do the debian-jenkins testers than effectively outline a tests goals, time and oracle design? There is not conceptual overview of „jobs“ „oracles“, so no design to hand out to newcomers, is the predefinite answer.


To mudancas: stage suite xuser ready

xterm: DISPLAY is not set

DISPLAY=:0 xterm

ps faux|grep -v „\[„|cut -c66-130|grep X|tail -n1|cut -c15-17>displaysshuser

E=`cat displaysshuser|sed -e „s/^[ ]*//“`; echo $E

DISPLAY=$E xterm #ok


dpkg --configure -a
ao="chromium ding dolphin cryptsetup hplip kate gimp git aspell-de kate libreoffice autokey-gtk autokey-qt xautomation uswsusp winpdb pdftk poppler-utils"
ssh -q -o 'StrictHostKeyChecking no' -p 2222 root@localhost "DEBIAN_FRONTEND=noninteractive apt-get --yes --force-yes install $ao" #>/t

The following NEW packages will be installed:
 avahi-daemon bind9-host ca-certificates ca-certificates-java chromium coinor-libcbc3
 coinor-libcgl1 coinor-libclp1 coinor-libcoinmp1 coinor-libcoinutils3 coinor-libosi1 cryptsetup
 cryptsetup-bin cups cups-client cups-common cups-core-drivers cups-filters
 cups-filters-core-drivers cups-ppdc cups-server-common default-jre default-jre-headless
 dh-python ding docbook-xml docbook-xsl dolphin dosfstools fonts-dejavu fonts-dejavu-extra
 fonts-freefont-ttf fonts-liberation fonts-opensymbol fonts-sil-gentium fonts-sil-gentium-basic
 fuse gdisk ghostscript gimp gimp-data git git-man gsfonts hplip hplip-data java-common
 javascript-common kate kate-data katepart kde-runtime kde-runtime-data kdelibs-bin
 kdelibs5-data kdelibs5-plugins kdoctools liba52-0.7.4 libabw-0.1-1 libass5 libauthen-sasl-perl
 libavc1394-0 libbaloocore4 libbaloofiles4 libbalooqueryparser4 libbaloowidgets4
 libbalooxapian4 libbind9-90 libcddb2 libcdio13 libcdr-0.1-1 libcmis-0.4-4 libdlrestrictions1
 libdns100 libe-book-0.1-1 libencode-locale-perl libeot0 libepub0 liberror-perl
 libetonyek-0.1-1 libexttextcat-2.0-0 libexttextcat-data libfam0 libfile-basedir-perl
 libfile-desktopentry-perl libfile-listing-perl libfile-mimeinfo-perl libfont-afm-perl
 libfreehand-0.1-1 libgconf2-4 libgimp2.0 libgltf-0.0-0 libgnome2-0 libgnome2-bin libgpgme++2
 libgs9 libgs9-common libhpmud0 libhsqldb1.8.0-java libhtml-form-perl libhtml-format-perl
 libhtml-parser-perl libhtml-tagset-perl libhtml-tree-perl libhttp-cookies-perl
 libhttp-daemon-perl libhttp-date-perl libhttp-message-perl libhttp-negotiate-perl libhyphen0
 libio-html-perl libio-socket-ssl-perl libisc95 libisccc90 libisccfg90 libiso9660-8
 libjbig2dec0 libjs-jquery libkactivities-bin libkactivities-models1 libkactivities6 libkate1
 libkateinterfaces4 libkatepartinterfaces4 libkcmutils4 libkde3support4 libkdeclarative5
 libkdecore5 libkdesu5 libkdeui5 libkdewebkit5 libkdnssd4 libkemoticons4 libkfile4
 libkfilemetadata4 libkhtml5 libkio5 libkjsapi4 libkjsembed4 libkmediaplayer4 libknewstuff3-4
 libknotifyconfig4 libkntlm4 libkonq-common libkonq5-templates libkonq5abi1 libkparts4 libkpty4
 libkrosscore4 libktexteditor4 libkxmlrpcclient4 liblangtag-common liblangtag1 libldb1
 liblircclient0 liblivemedia23 liblwp-mediatypes-perl liblwp-protocol-https-perl liblwres90
 libmad0 libmailtools-perl libmatroska6 libmhash2 libmodplug1 libmpcdec6 libmpdec2 libmpeg2-4
 libmspub-0.1-1 libmtp-common libmtp-runtime libmtp9 libmwaw-0.3-3 libmysqlclient18
 libmythes-1.2-0 libneon27-gnutls libnepomuk4 libnepomukcore4 libnepomukquery4a
 libnepomukutils4 libnet-dbus-perl libnet-http-perl libnet-smtp-ssl-perl libnet-ssleay-perl
 libnl-3-200 libnl-route-3-200 libnotify4 libnspr4 libnss-mdns libnss3 libntdb1 libntrack-qt4-1
 libntrack0 libodfgen-0.1-1 liborcus-0.8-0 libpaper-utils libparted2 libpcsclite1 libperl5.20
 libphonon4 libplasma3 libpolkit-qt-1-1 libpoppler-glib8 libpoppler-qt4-4 libpoppler46
 libpostproc52 libproxy-tools libpulse-mainloop-glib0 libpython2.7 libpython3-stdlib
 libpython3.4 libpython3.4-minimal libpython3.4-stdlib libqca2 libqjson0 libqmobipocket1
 libqpdf13 libqt4-declarative libqt4-designer libqt4-opengl libqt4-qt3support libqt4-script
 libqt4-sql libqt4-sql-mysql libqt4-svg libqt4-xmlpatterns libqtwebkit4 libraptor2-0 librasqal3
 librdf0 libreoffice libreoffice-avmedia-backend-gstreamer libreoffice-base
 libreoffice-base-core libreoffice-base-drivers libreoffice-calc libreoffice-common
 libreoffice-core libreoffice-draw libreoffice-impress libreoffice-java-common libreoffice-math
 libreoffice-report-builder-bin libreoffice-sdbc-firebird libreoffice-sdbc-hsqldb
 libreoffice-style-galaxy libreoffice-writer libresid-builder0c2a librevenge-0.0-0 libruby2.1
 libsane-hpaio libsctp1 libsdl-image1.2 libsensors4 libservlet2.5-java libshine3 libshout3
 libsidplay2 libsmbclient libsnmp-base libsnmp30 libsolid4 libsoprano4 libspeechd2 libspeexdsp1
 libssh-gcrypt-4 libstreamanalyzer0 libstreams0 libswscale3 libtag1-vanilla libtag1c2a
 libtalloc2 libtcl8.6 libtevent0 libthreadweaver4 libtie-ixhash-perl libtimedate-perl libtk8.6
 libtwolame0 libudisks2-0 libupnp6 libupower-glib3 liburi-perl libusageenvironment1 libva-drm1
 libva-x11-1 libvcdinfo0 libvisio-0.1-1 libvlc5 libvlccore8 libvncclient0 libwbclient0 libwebp5
 libwebpdemux1 libwebpmux1 libwmf0.2-7 libwpd-0.10-10 libwpg-0.3-3 libwps-0.3-3 libwww-perl
 libwww-robotrules-perl libx11-protocol-perl libxapian22 libxcb-composite0 libxcb-keysyms1
 libxcb-randr0 libxcb-xv0 libxml-parser-perl libxml-twig-perl libxml-xpathengine-perl
 libxml2-utils libxss1 libyajl2 libyaml-0-2 libzip2 libzvbi-common libzvbi0 lksctp-tools
 lp-solve mysql-common nepomuk-core-data notification-daemon ntfs-3g ntrack-module-libnl-0
 openjdk-7-jre openjdk-7-jre-headless oxygen-icon-theme parted patch phonon phonon-backend-vlc
 plasma-scriptengine-javascript poppler-data poppler-utils printer-driver-gutenprint
 printer-driver-hpcups printer-driver-postscript-hp python-cairo python-dbus python-dbus-dev
 python-gobject-2 python-gtk2 python-imaging python-numpy python-pexpect python-pil
 python-renderpm python-reportlab python-reportlab-accel python-support python-talloc python3
 python3-minimal python3-uno python3.4 python3.4-minimal qpdf rsync ruby ruby2.1
 rubygems-integration samba-libs sgml-data soprano-daemon tcl tcl8.6 tk tk8.6 trans-de-en
 tzdata-java udisks2 uno-libs3 upower ure vlc vlc-data vlc-nox vlc-plugin-notify
 vlc-plugin-pulse vlc-plugin-samba xdg-utils xz-utils
The following packages will be upgraded:
1 upgraded, 381 newly installed, 0 to remove and 0 not upgraded.
1 not fully installed or removed.
Need to get 0 B/360 MB of archives.
After this operation, 1181 MB of additional disk space will be used.
cp: failed to extend '/var/tmp/mkinitramfs_DZfPxe//lib64': No space left on device
^Cdpkg: error processing package initramfs-tools (--configure):
 subprocess installed post-installation script was interrupted
Setting up libmysqlclient18:amd64 (5.5.52-0+deb8u1) ...
dpkg: unrecoverable fatal error, aborting:
 unable to fill /var/lib/dpkg/updates/tmp.i with padding: No space left on device
root@ahostname:~# df
Filesystem 1K-blocks Used Available Use% Mounted on
/dev/sda1 2850296 2833904 0 100% /
udev 10240 0 10240 0% /dev
tmpfs 49640 8636 41004 18% /run
tmpfs 124092 0 124092 0% /dev/shm
tmpfs 5120 0 5120 0% /run/lock
tmpfs 124092 0 124092 0% /sys/fs/cgroup
tmpfs 24820 0 24820 0% /run/user/1000
root@ahostname:~# df -h
Filesystem Size Used Avail Use% Mounted on
/dev/sda1 2.8G 2.8G 0 100% /
udev 10M 0 10M 0% /dev
tmpfs 49M 8.5M 41M 18% /run
tmpfs 122M 0 122M 0% /dev/shm
tmpfs 5.0M 0 5.0M 0% /run/lock
tmpfs 122M 0 122M 0% /sys/fs/cgroup
tmpfs 25M 0 25M 0% /run/user/1000

So that is what happened, we got messed up, debian package system blow up the request for a libreoffice wordprocessor, a browser type chromium plus some gimmick, 2G, plus its swapping  you easily reach the limit. Give it more space next time is an answer, other: learn interaction with debian packaging system better, was not there debconf thing among? It is mandatory, seems to me.

Click here. No, not this one, pun intended (;:

Here is where, it suppoedly lives, even though not a 100% sure. There which kinds of request for which interfaces an which „times“ (reaction times)?

A Table like this:

Request, interface, times

-Give the space required for packages install!, apt-gets output to standard error?, 5 minutes reaction time

-Give me the „questions not yet answered“ for any package to be installed?, ,

-Put, answer, xy in to have package installation done non-interactively?, ,

debconf-getlang it templates > debconf-getlang --stats ...  


B. Question hierarchy  package/* shared templates and questions exist:
consists of stanzas??stancas? in a rfc-822 compliant format 

I like that this is a protocol. Has everybody heard? I have nothing against in claiming that protocol. But of what I am very fond of. is that these debian pioneers did not put their product on top lets imagine ISO-Standard, but rfc. Thank you having not driven mad, entirely.  However, we got our stances preserved sanely since 1982. Big Thank-You for that responsability, honestly. People today should have messed this with certain pointage.

 RFC # 822

 Obsoletes: RFC #733 (NIC #41952)



 August 13, 1982

 Revised by

 David H. Crocker

 Dept. of Electrical Engineering
 University of Delaware, Newark, DE 19711
 Network: DCrocker @ UDel-Relay

 Standard for ARPA Internet Text Messages


 PREFACE .................................................... ii

 1. INTRODUCTION ........................................... 1

 1.1. Scope ............................................ 1
 1.2. Communication Framework .......................... 2

 2. NOTATIONAL CONVENTIONS ................................. 3

 3. LEXICAL ANALYSIS OF MESSAGES ........................... 5

 3.1. General Description .............................. 5
 3.2. Header Field Definitions ......................... 9
 3.3. Lexical Tokens ................................... 10
 3.4. Clarifications ................................... 11

 4. MESSAGE SPECIFICATION .................................. 17

 4.1. Syntax ........................................... 17
 4.2. Forwarding ....................................... 19
 4.3. Trace Fields ..................................... 20
 4.4. Originator Fields ................................ 21
 4.5. Receiver Fields .................................. 23
 4.6. Reference Fields ................................. 23
 4.7. Other Fields ..................................... 24

 5. DATE AND TIME SPECIFICATION ............................ 26

 5.1. Syntax ........................................... 26
 5.2. Semantics ........................................ 26

 6. ADDRESS SPECIFICATION .................................. 27

 6.1. Syntax ........................................... 27
 6.2. Semantics ........................................ 27
 6.3. Reserved Address ................................. 33

 7. BIBLIOGRAPHY ........................................... 34


 A. EXAMPLES ............................................... 36
 B. SIMPLE FIELD PARSING ................................... 40
 C. DIFFERENCES FROM RFC #733 .............................. 41

 August 13, 1982 - i - RFC #822

talk to postinst scripts and other scripts as well, all using a special protocol.
Configuration management

Each (variable template) variable in the configuration space is associated with 
some meta-data. 
The minimum meta-data associated with a variable is: long and short description, 
type, and default value
Type string boolean select multiselect note text password title 

 Table 2. Numeric status codes

Range Description
0 success
1-9 reserved
10-19 invalid parameters
20-29 syntax errors
30-99 command-specific return codes
100-109 internal errors
110-255 reserved
INPUT priority question

This tells the frontend (of what? the users one is assumed) to display a question 
(or other type of item) to the user.
 question is the name of the item to display, all other information about the item 
is retrieved from the templates described previously. priority is how important it
 is that the user be prompted. The frontend need only ask this question if the
 priority is high enough. The question is not displayed until a go command
 is given. This allows us to ask multiple questions in a single screen. Once a
 question has been displayed to the user and the user has provided input, the
 frontend will set the seen flag.

Table 4. Supported priorities

Priority Description
low Very trivial items that have defaults that will work in the vast majority of cases.
medium Normal items that have reasonable defaults.
high Items that don't have a reasonable default.
critical Items that will probably break the system without user intervention.
Note that the frontend decides if the user is actually prompted or not. If the user has already answered a question, they are normally not asked it again even if input is called again. And if the user is ignoring low priority items, they will not see them. In either of these cases, this command returns the numeric return code 30.


Fazit now: Well, there are tools affected by an still unwritten history of human slavery of each others for modern days. Too much business is rolling on that secret streets, that not one decent historian may have chosen, to put these things decently for contemporary common sense. That is the situation, and it is insane, because: So the developers, little players in game, should fall into an attitude of swearing to the authorities, their tools are meant slavery means for. They, even defending themselves for doing nothing uncommon, thus nothing false, but are already prepared for swearing like this:

I would never ever help a production of a tool, with which one of YOUR historic graphical users could escape  YOUR,  the mighty and evil master’s,  due personal time control over this humans.



(Well, I thought, heard is it a „cart“ actually. )


-I got as well hooked up at ppas, too.

Only ubuntu they say, or: you hack them -maybe- back to debian. Good luck. The latter one required in any case a versatile skillfulness with debian tools, debconf included, I guess. The former recall on the initial approach and that is: that we take what ever it takes to reach to that ppa, even taking another vm to effectuate it via ubuntu, even changing the target vm to ubuntu. Thinks like this happen and that forces you to change your platform in the end. PPA.