79777179

Date: 2025-09-28 07:01:22
Score: 2
Natty:
Report link

The following code solves the problem posed by the question, i.e., retrieve schedules that have at least one job (any component in the pipeline that runs on the schedule) successfully finished.

The issue however is that when a schedule has multiple runs, only the first run is considered.

A more interesting problem is to retrieve schedules that have at least one run completed, or the last run completed, or the last run failed. I will address this question in a separate post (please answer the question if you have a better solution)

# -------------------------------------------------
# Connect to AML and set tracking URI in mlflow
# -------------------------------------------------
from azure.ai.ml import MLClient
from azure.identity import DefaultAzureCredential, InteractiveBrowserCredential

# Connect to AML
client = MLClient(
        credential= InteractiveBrowserCredential(),
        subscription_id="my-subscription-id",
        resource_group_name="my-resource-group",
        workspace_name="my-workspace"
        )


# set tracking uri if run locally
mlflow_tracking_uri = client.workspaces.get(client.workspace_name).mlflow_tracking_uri
mlflow.set_tracking_uri(mlflow_tracking_uri)

# -------------------------------------------------
# Retrieve and filter schedules
# -------------------------------------------------
schedules = client.schedules.list()

# optional: filter schedules based on name containing substring:
selected_schedules = [
    schedule
    for schedule in schedules
    if "inference_pipelin" in schedule.name
]

# -------------------------------------------------
# Get schedules that have *at least* one job (not one run) completed
# -------------------------------------------------

experiment_names = [schedule.create_job.experiment_name for schedule in selected_schedules]
filter_string = " or ".join([f"(name = {x})" for x in experiment_names])
experiments = mlflow.search_experiments(filter_string=filter_string)
experiments_df = pd.DataFrame(
    {
        "experiment_id": [exp.experiment_id for exp in experiments],
        "experiment_name": [exp.name for exp in experiments],
        "schedule": selected_schedules,
    }
)
all_runs = mlflow.search_runs(
    experiment_names=experiment_names,
    filter_string="tags.mlflow.user='Jaume Amores'",
)
selected_experiments = all_runs.groupby("experiment_id")["status"].apply(lambda x: (x == "FINISHED").any())
selected_schedules = experiments_df[experiments_df["experiment_id"].isin(selected_experiments[selected_experiments].index)]["schedule"].tolist()
Reasons:
  • RegEx Blacklisted phrase (2.5): please answer the question
  • Long answer (-1):
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Low reputation (0.5):
Posted by: Jau A

79777177

Date: 2025-09-28 06:57:21
Score: 1.5
Natty:
Report link

Never change the key ! For a very simple system , this is possible , but this is not bad practice, is a disaster. Add a priority column, if the table is over 10K rows put an index on the priority column.

In case you have to enter rows in between usually , there are options like :
- priority , real number
- 2 columns , priority and subpriority and reorder from time to time.
- priority as integer but with a gap in between like every priority multiplied with 100.

There is no very simple way to solve this :( .

Reasons:
  • Blacklisted phrase (1): :(
  • Long answer (-0.5):
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: detzu

79777173

Date: 2025-09-28 06:45:19
Score: 2.5
Natty:
Report link

To remove these files I simply use CCleaner. It works for me on my Windows 7 system.

Reasons:
  • Whitelisted phrase (-1): works for me
  • Low length (1.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Willem Grooters

79777159

Date: 2025-09-28 06:18:13
Score: 4
Natty:
Report link

Check out this, it's still in development, but it covers many of the points needed

https://www.npmjs.com/package/expo-media-control

Reasons:
  • Probably link only (1):
  • Low length (1.5):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Jum'ah Safarty

79777148

Date: 2025-09-28 05:57:08
Score: 1
Natty:
Report link

https://pub.dev/packages/extended_image is a better more up to date package
it has all features of CachedNetworkImage and even more.

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Starts with a question (0.5): is a
  • High reputation (-1):
Posted by: Khaled

79777137

Date: 2025-09-28 05:31:04
Score: 1
Natty:
Report link
  fd.set(
    "session",
    JSON.stringify({
      type: "realtime",
      model: "gpt-realtime",
      audio: {
        output: {
          voice: "marin",
        },
      },
    })
  )

Documentation was wrong - this fixes it
Reasons:
  • Low length (0.5):
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Low reputation (0.5):
Posted by: Student

79777133

Date: 2025-09-28 05:16:01
Score: 1
Natty:
Report link

Improving app performance usually comes down to identifying bottlenecks and fixing them systematically. Some common approaches are:

In practice, the right fix depends on what your app is struggling with—UI rendering, API response time, or device-specific issues. Start with profiling, then apply optimizations where they’ll have the biggest impact.

Reasons:
  • Long answer (-0.5):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Rishabh Sharma

79777130

Date: 2025-09-28 04:59:58
Score: 2.5
Natty:
Report link

Dos box-x the fork of the original dosbox have the debugger already compiled an reachable trough context menú on the window. Give it a try https://dosbox-x.com/

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (0.5):
Posted by: velteyn

79777126

Date: 2025-09-28 04:51:55
Score: 1
Natty:
Report link

Send audio output to two devices with AudioGraph in an UWP app

I realized there is no way to switch the output device without recreating the AudioGraph.

So obviously the recreating the AudioGraph is the right thing to do.

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Self-answer (0.5):
  • High reputation (-1):
Posted by: Tom Huntington

79777120

Date: 2025-09-28 04:28:51
Score: 1.5
Natty:
Report link

Xcode can't install on Linux. Xcode support only MacOS because it has need to Apple ID. But you can use vertual Mac on your pc

Reasons:
  • Whitelisted phrase (-1.5): you can use
  • Low length (1):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Faysal Ahmed

79777109

Date: 2025-09-28 03:53:44
Score: 2
Natty:
Report link

No, you can use Direct File System Access.

Reasons:
  • Whitelisted phrase (-1.5): you can use
  • Low length (1.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Abdallah

79777108

Date: 2025-09-28 03:53:44
Score: 1
Natty:
Report link
android build.gradle file add this code

gradle.projectsEvaluated {
    project(':app') { p ->
        p.tasks.matching { it.name.startsWith('minify') && it.name.endsWith('WithR8') }.all { r8Task ->
            r8Task.dependsOn(p.tasks.named('extractProguardFiles'))
        }
    }
}
Reasons:
  • Low length (0.5):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: Viggo

79777106

Date: 2025-09-28 03:51:43
Score: 3.5
Natty:
Report link

I arrived to the answer while formulating this question late at night. The answer to acquire the property of a tuple is to call the argument by the tuple.get() method

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Self-answer (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: wyvernghost

79777102

Date: 2025-09-28 03:36:41
Score: 3.5
Natty:
Report link

Review the syntax for DLookup. Particularly the criteria. You do not want to include the word "Where" nor repeat the field name that you are returning.

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Unregistered user (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Jim

79777093

Date: 2025-09-28 03:11:35
Score: 2.5
Natty:
Report link

I end up just using Swiperjs.

https://github.com/nolimits4web/swiper

https://swiperjs.com/demos

It supports vanilla js, React, etc. Though not built for MUI.

Reasons:
  • Probably link only (1):
  • Low length (1):
  • No code block (0.5):
Posted by: Nor.Z

79777079

Date: 2025-09-28 02:09:24
Score: 8 🚩
Natty:
Report link

Please I will keep to your community guideline please just help me on releasing my Facebook account please I have tried my possible best but there is no way they can release it to me please help me so I could recover it back😭😭😭😭🙏

Reasons:
  • Blacklisted phrase (1): help me
  • Blacklisted phrase (0.5): 🙏
  • RegEx Blacklisted phrase (3): please help me
  • RegEx Blacklisted phrase (1): I will keep to your community guideline please just help me on releasing my Facebook account please I have tried my possible best but there is no way they can release it to me please
  • Low length (0.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Scott

79777071

Date: 2025-09-28 01:16:13
Score: 6.5 🚩
Natty: 4
Report link

can someone give me solution i did try to change version but still same eror of migration deployment fail

Reasons:
  • RegEx Blacklisted phrase (2.5): can someone give me solution
  • Low length (1):
  • No code block (0.5):
  • Unregistered user (0.5):
  • Single line (0.5):
  • Starts with a question (0.5): can someone give me solution i
  • Low reputation (1):
Posted by: Mysterious Moon

79777068

Date: 2025-09-28 01:04:10
Score: 1.5
Natty:
Report link

Deblobbing is the attempt to remove some of the binary blobs shipped with linux distro source code libraries.

"blobs are binary firmware,"

Uhhh... no. If a distro has firmware, something is already way wrong. Consider the HLDS - GHA2N - HH SATA DVD+/-RW DVD player. A new firmware for it was uploaded in 2013, version A103, A01. It does the following:
1. To improve of write quality ( Write strategy )
a) DVD+R DL Verbatim 8x under high temp
b) DVD-R DL MKM 8x under low temp
2. To Improve of CD-ROM readability during reliability test under high temp by adjusting tilt

That's firmware. It doesn't even run on your own cpu or OS.

All "install and run" linux distros are loaded with these binary blobs. If your system does what you want, you'd know. But, if it does something you didn't want, how do you know? What if it's exfiltrating your junk? There's almost no way to know unless you review the source code, which you cannot do unless your system was deblobbed ... in which case it probably won't run.

An example of what is removed by deblob-6.8 is the enumeration of BPF preload sources/headers: kernel/bpf/preload/iterators/iterators.bpf.c, kernel/bpf/preload/iterators/iterators.lskel-little-endian.h, and kernel/bpf/preload/iterators/iterators.lskel-big-endian.h. The sed script removes embedded eBPF programs (“light skeleton”) pinned in bpffs for debugging/introspection. It's kernel infrastructure, not device drivers. Not firmware, either. Lot's of drivers are binary blobs. There are some deblobbing scripts. They are likely to make compilation fail, but the goal is to make it not fail.

The blobs aren't firmware though.

Reasons:
  • Blacklisted phrase (1): how do you
  • Long answer (-1):
  • No code block (0.5):
  • Contains question mark (0.5):
  • Low reputation (0.5):
Posted by: Jason Arthur Taylor

79777065

Date: 2025-09-28 00:48:08
Score: 2.5
Natty:
Report link

That’s a great question the tag saying “iPhone” usually just reflects the app version, not the specific device. I saw a helpful breakdown about this on https://mnpappsgames.com/ and it confirmed that the same encoder string often appears for iPads too.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: jzjzisis hejeheueu

79777061

Date: 2025-09-28 00:10:01
Score: 0.5
Natty:
Report link

I found a solution - it's because I had to play the 2nd animation after the 1st animation is done. Luckily, I already have a custom RLCallbackAction and RLWaitAction handy for this purpose. Something like this:


struct RLAggregationActionImpl: RLActionImpl {
  
  enum Aggregation {
    case group
    case sequence
  }
  
  let actions: [any RLActionImpl]
  let aggregation: Aggregation

  func createAnimation(entity: RLEntity) -> RLAnimation {
    switch aggregation {
    case .group:
      let animations = actions.map { $0.createAnimation(entity: entity) }
      return try! .group(with: animations)
    case .sequence:
      let animations = actions
        .enumerated()
        .flatMap { (i, impl) -> [RLAnimation] in
          // We can't directly pass the action to .sequence
          // Because 2 transform actions don't "Add up", likely because the animation is "inflated" when we call `entity.playAnimation`.
          // As a workaround, we have to wrap it under a callback action, which calls `runAction` when it actually needs to run the action in the sequence.
          // See:  https://stackoverflow.com/questions/79716776/in-realitykit-a-sequence-of-2-fromtobyaction-does-not-add-up-transforms
          
          let callback = RLCallbackActionImpl(duration: 0, callback: { $0.runActionImpl(impl) }) 
            .createAnimation(entity: entity)
          
          // callback happens immediately, but runAction will take duration to complete. So we need to insert a "gap" (wait action) between callbacks.
          if i+1 < actions.count {
            let wait = RLWaitActionImpl(duration: impl.duration)
              .createAnimation(entity: entity)
            return [callback, wait]
          } else {
            return [callback]
          }
        }
      
      return try! .sequence(with: animations)
    }
  }
}
Reasons:
  • Blacklisted phrase (1): stackoverflow
  • Long answer (-1):
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Low reputation (0.5):
Posted by: HL666

79777058

Date: 2025-09-27 23:58:59
Score: 4
Natty:
Report link

Ah, I think I found a solution. Not sure why it was a problem, but this got it working.

First, remove all three packages entirely from my system: Scrapy, Beautiful Soup, and bs4. Scrapy was installed by Brew, and the others by pip3.

Then created a venv, activated it, then used pip3 install all three modules.

This got it working. So it was something about how the Brew installed Scrapy wasn't finding Python module installed in the pip3 installed environment.

I don't understand Python and can't explain the compatibility issue with Brew installed Python and/or Python modules.

All I can tell you is once I removed everything, then use pip3 to insteall Scrapy and the additional modules I wanted, that's what got it working.

If anyone can help explain what was going on, that would be helpful.

Reasons:
  • RegEx Blacklisted phrase (3): anyone can help
  • RegEx Blacklisted phrase (0.5): anyone can help
  • Long answer (-0.5):
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Low reputation (1):
Posted by: JReekes

79777044

Date: 2025-09-27 23:13:49
Score: 2
Natty:
Report link

I know this is late, but you need to call collectionView.layoutIfNedded() and this will prevent future unneeded animations.

Reasons:
  • Low length (1):
  • Has code block (-0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: everest3d

79777038

Date: 2025-09-27 22:59:46
Score: 1
Natty:
Report link

The potential answer should be based on the historical data of accepted candidates.

One can frame this as ranking or recommendation problem which are common approaches. like Education, categorical, experience, numeric, resume keywords-TF-IDF/embeddings.

  1. Feature Engineering: Encode education as categories, Use experience as a numeris value and also Turn resume keywords into numbers using TF-IDF or proberbly embeddings.

  2. Model Training. Train a supervised model like neural network or XGBoost using your historical accepted date against non accepted data

  3. Ranking. Rank candidate by their their predicted probability score to get your top 10

  4. Scalability. Impute the use of simplarity search to quickly compare candidates.

Reasons:
  • Long answer (-0.5):
  • No code block (0.5):
  • Low reputation (1):
Posted by: user30818063

79777006

Date: 2025-09-27 21:12:26
Score: 1
Natty:
Report link

Do you also want to copy the .git history to be copied to your new repo or only the code files?

I suppose u want to you to copy the .git history too( tags, branches, commits) , use --bare flag while cloning to get just the .git history and then use the --mirror flag while pushing to the new repo which also regenerates the code files:

git clone --bare https://github.com/owner/repo1.git
cd repo1.git 
git push --mirror https://github.com/you/repo2.git
Reasons:
  • Has code block (-0.5):
  • Contains question mark (0.5):
  • Low reputation (1):
Posted by: devRito

79776998

Date: 2025-09-27 20:57:23
Score: 0.5
Natty:
Report link

Oh, I solved this. Maybe it is permission denied because the env is in C://ai, when I use administrator mode, it success. image

Reasons:
  • Whitelisted phrase (-2): I solved
  • Probably link only (1):
  • Low length (1):
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Low reputation (0.5):
Posted by: 謝咏辰

79776987

Date: 2025-09-27 20:41:19
Score: 0.5
Natty:
Report link
Soo after almost 7 Hours Non stop if found the permanent solution.

1.  Open your generated Unity-iPhone.xcworkspace in Xcode.
    2.  In the left sidebar, click on the UnityFramework target.
    3.  At the top, select the Build Settings tab.
    4.  In the search bar, type: Other Linker Flags
and delete these 2 From all the dubug release etc etc

* Removed -ld_classic
* Removed -weak-lSystem (because it’s invalid)


now clean project 


and now 


||1.|Select UnityFramework target.|
|---|---|---|
||2.|Go to Build Settings.|
||3.|In the search bar at the top, type Framework Search Paths.|




add these 4

$(inherited)
$(PROJECT_DIR)/Frameworks/com.ptc.vuforia.engine/Vuforia/Plugins/iOS
$(PROJECT_DIR)/Pods/Google-Mobile-Ads-SDK/Frameworks/**
$(PROJECT_DIR)/Pods/Firebase/Frameworks/**

If you found this usefull please 

just download my app and give me full rating

https://apps.apple.com/pk/app/stickar-ar-stickers-gifs/id6497066147
Reasons:
  • Long answer (-0.5):
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Low reputation (1):
Posted by: Osman Ahsan Sheikh

79776975

Date: 2025-09-27 20:13:14
Score: 2
Natty:
Report link

Using the net/http https://pkg.go.dev/net/http#CrossOriginProtection available from Go 1.25, I was able to properly set up deterrence against CSRF in a manner that solves my problem.

Only trusted origins are allowed to make requests to my API and since all modern browsers send Origin, Referer as well as Sec-Fetch-Site headers, this means the threat is mitigated.

The only concession is older browsers are not supported, but in truth, my use case does not need to support pre-2010 browsers - upgrade your browsers!

Reasons:
  • No code block (0.5):
  • Self-answer (0.5):
  • Low reputation (1):
Posted by: Biobele Johnbull

79776966

Date: 2025-09-27 19:51:09
Score: 3.5
Natty:
Report link

You can try downgrading and try it if that helps

Reasons:
  • Low length (1.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Iam Him

79776956

Date: 2025-09-27 19:10:00
Score: 1.5
Natty:
Report link

This is an unresolved issue in ASP.NET which was first reported in 2019:

There is a workaround which allows '___' (triple underscore) to be used instead of '.' (link)

Reasons:
  • Probably link only (1):
  • Low length (1):
  • No code block (0.5):
  • High reputation (-1):
Posted by: asynts

79776955

Date: 2025-09-27 19:10:00
Score: 2
Natty:
Report link

To persist Google login across sessions in Flutter using InAppWebView, you need to manually manage cookies. Use CookieManager().getCookies() after login to store relevant cookies, then restore them with CookieManager().setCookie() on the next app launch before loading the Google login page. Also, make sure thirdPartyCookiesEnabled is set to true. This helps avoid the dreaded CookieMismatch issue.

Reasons:
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Ben Cutting

79776953

Date: 2025-09-27 19:02:58
Score: 2
Natty:
Report link

I put

<i class="fab fa-whatsapp"></i>

OK
Reasons:
  • Low length (1.5):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: Alexsandro Bezerra

79776921

Date: 2025-09-27 17:45:42
Score: 1
Natty:
Report link

yes , thinking of using a randomly generated number and then encoding it would be a great idea at first, but lets say a base62 encoded string of length 6 would have 54B combinations of strings but when we try to generate a random number and then encode it (saying 1000 rps) the collision rate is around 880k strings which can be an issue and require the service to double check the availability of the shortened string/url.

So, rather using a counter which avoids re checking the db for availability but has some security issues, and finally the bijectibve function does a one to one mapping using the id of the url in db and then base encoding and when retrieving it does inverse function to retrieve the long url, in both cases it l saves us time not checking the db for collision check.

Reasons:
  • Long answer (-0.5):
  • No code block (0.5):
  • Low reputation (1):
Posted by: golthi rithvik

79776913

Date: 2025-09-27 17:32:39
Score: 5.5
Natty:
Report link

Solution currently being discussed at: https://github.com/jestjs/jest/issues/15837

Reasons:
  • Probably link only (1):
  • Low length (2):
  • No code block (0.5):
  • Self-answer (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Christian Siqueira

79776909

Date: 2025-09-27 17:25:37
Score: 2.5
Natty:
Report link

/*

This is a stand alone bypass made by Apxaey. Feel free to use this in your cheats but credit me for the bypass as i put alot of time into this.

If you have some brain cells you will be able to incorporate this into your cheats and remain undetected by user-mode anticheats.

Obviously standard cheat 'recommendations' still apply:

1.) Use self-written or not signatured code

2.) Dont write impossible values

3.) If your going internal use a manual map injector

If you follow the guidelines above and use this bypass you will be safe from usermode anticheats like VAC.

Obviously you can build and adapt upon my code to suit your needs.

If I was to make a cheat for myself i would put this bypass into something i call an 'external internal' cheat.

Whereby you make a cheat and inject into a legitimate program like discord and add a check to the this bypass to only hijack a handle from the process you inject into, giving the appearence that nothing is out of the ordinary

However you can implement this bypass into any form of cheat, its your decision.

If you need want some more info i recommend you watch my YT video on this bypass.

Anyways if you want to see more of my stuff feel free to join my discord server https://discord.gg/GVyENvk. Here's my YT as well https://www.youtube.com/channel/UCPN6OOLxn1OaBP5jPThIiog.

*/

#include <Windows.h>

#include <iostream>

#include <TlHelp32.h>

#include <string>

#include "main.h"

//simple function i made that will just initialize our Object_Attributes structure as NtOpenProcess will fail otherwise

OBJECT_ATTRIBUTES InitObjectAttributes(PUNICODE_STRING name, ULONG attributes, HANDLE hRoot, PSECURITY_DESCRIPTOR security)

{

OBJECT_ATTRIBUTES object;

object.Length = sizeof(OBJECT_ATTRIBUTES);

object.ObjectName = name;

object.Attributes = attributes;

object.RootDirectory = hRoot;

object.SecurityDescriptor = security;

return object;

}

SYSTEM_HANDLE_INFORMATION* hInfo; //holds the handle information

//the handles we will need to use later on

HANDLE procHandle = NULL;

HANDLE hProcess = NULL;

HANDLE HijackedHandle = NULL;

//basic function i made that will get a proccess id from a binary name, you dont have to use it. It needs some rework but for now it gets the job done.

DWORD GetPID(LPCSTR procName)

{

//create a process snapshot

HANDLE hSnap = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, false);

if (hSnap && hSnap != INVALID_HANDLE_VALUE) //check the snapshot succeded

{

    PROCESSENTRY32 procEntry;

    //zero the memory containing the file names

    ZeroMemory(procEntry.szExeFile, sizeof(procEntry.szExeFile)); 

    //repeat the loop until a name matches the desired name

        do

        {

            if (lstrcmpi(procEntry.szExeFile, procName) == NULL) {

                return procEntry.th32ProcessID;

                CloseHandle(hSnap);

            }

        } while (Process32Next(hSnap, &procEntry));

    

}

}

bool IsHandleValid(HANDLE handle) //i made this to simply check if a handle is valid rather than repeating the if statments

{

if (handle && handle != INVALID_HANDLE_VALUE)

{

    return true;

}

else

{

    return false;

}

}

void CleanUpAndExit(LPSTR ErrorMessage) //just a function to clean up and exit.

{

delete\[\] hInfo;

procHandle ? CloseHandle(procHandle) : 0;



std::cout \<\< ErrorMessage \<\< std::endl;

    

system("pause");

}

HANDLE HijackExistingHandle(DWORD dwTargetProcessId)

{

 HMODULE Ntdll = GetModuleHandleA("ntdll"); // get the base address of ntdll.dll

//get the address of RtlAdjustPrivilege in ntdll.dll so we can grant our process the highest permission possible

 \_RtlAdjustPrivilege RtlAdjustPrivilege = (\_RtlAdjustPrivilege)GetProcAddress(Ntdll, "RtlAdjustPrivilege");

boolean OldPriv; //store the old privileges

// Give our program SeDeugPrivileges whcih allows us to get a handle to every process, even the highest privileged SYSTEM level processes.

RtlAdjustPrivilege(SeDebugPriv, TRUE, FALSE, &OldPriv);

//get the address of NtQuerySystemInformation in ntdll.dll so we can find all the open handles on our system

 \_NtQuerySystemInformation NtQuerySystemInformation = (\_NtQuerySystemInformation)GetProcAddress(Ntdll, "NtQuerySystemInformation");

//get the address of NtDuplicateObject in ntdll.dll so we can duplicate an existing handle into our cheat, basically performing the hijacking

\_NtDuplicateObject NtDuplicateObject = (\_NtDuplicateObject)GetProcAddress(Ntdll, "NtDuplicateObject");

//get the address of NtOpenProcess in ntdll.dll so wecan create a Duplicate handle

 \_NtOpenProcess NtOpenProcess = (\_NtOpenProcess)GetProcAddress(Ntdll, "NtOpenProcess");

 //initialize the Object Attributes structure, you can just set each member to NULL rather than create a function like i did

OBJECT_ATTRIBUTES Obj_Attribute = InitObjectAttributes(NULL, NULL, NULL, NULL);



//clientID is a PDWORD or DWORD\* of the process id to create a handle to

CLIENT_ID clientID = { 0 };

//the size variable is the amount of bytes allocated to store all the open handles

DWORD size = sizeof(SYSTEM_HANDLE_INFORMATION);

//we allocate the memory to store all the handles on the heap rather than the stack becuase of the large amount of data

hInfo = (SYSTEM_HANDLE_INFORMATION\*) new byte\[size\];

//zero the memory handle info

ZeroMemory(hInfo, size);

//we use this for checking if the Native functions succeed

NTSTATUS NtRet = NULL;

do

{

    // delete the previously allocated memory on the heap because it wasn't large enough to store all the handles

    delete\[\] hInfo;

    //increase the amount of memory allocated by 50%

    size \*= 1.5;

    try

    {

        //set and allocate the larger size on the heap

        hInfo = (PSYSTEM_HANDLE_INFORMATION) new byte\[size\];

    }

    catch (std::bad_alloc) //catch a bad heap allocation.

    {

        CleanUpAndExit("Bad Heap Allocation");

    }

    Sleep(1); //sleep for the cpu

    //we continue this loop until all the handles have been stored

} while ((NtRet = NtQuerySystemInformation(SystemHandleInformation, hInfo, size, NULL)) == STATUS_INFO_LENGTH_MISMATCH);

//check if we got all the open handles on our system

if (!NT_SUCCESS(NtRet))

{

    CleanUpAndExit("NtQuerySystemInformation Failed");

}

//loop through each handle on our system, and filter out handles that are invalid or cant be hijacked

for (unsigned int i = 0; i \< hInfo-\>HandleCount; ++i)

{

    //a variable to store the number of handles OUR cheat has open.

    static DWORD NumOfOpenHandles; 

    //get the amount of outgoing handles OUR cheat has open

    GetProcessHandleCount(GetCurrentProcess(), &NumOfOpenHandles);

    //you can do a higher number if this is triggering false positives. Its just to make sure we dont fuck up and create thousands of handles

    if (NumOfOpenHandles \> 50)

    {

        CleanUpAndExit("Error Handle Leakage Detected"); 

    }

    //check if the current handle is valid, otherwise increment i and check the next handle

    if (!IsHandleValid((HANDLE)hInfo-\>Handles\[i\].Handle)) 

    {

        continue;

    }

    //check the handle type is 0x7 meaning a process handle so we dont hijack a file handle for example

    if (hInfo-\>Handles\[i\].ObjectTypeNumber != ProcessHandleType)

    {

        continue;

    }

    

    //set clientID to a pointer to the process with the handle to out target

    clientID.UniqueProcess = (DWORD\*)hInfo-\>Handles\[i\].ProcessId;

    //if procHandle is open, close it

    procHandle ? CloseHandle(procHandle) : 0;

    //create a a handle with duplicate only permissions to the process with a handle to our target. NOT OUR TARGET.

    NtRet = NtOpenProcess(&procHandle, PROCESS_DUP_HANDLE, &Obj_Attribute, &clientID);

    if (!IsHandleValid(procHandle) || !NT_SUCCESS(NtRet)) //check is the funcions succeeded and check the handle is valid

    {

        continue;

    }

    //we duplicate the handle another process has to our target into our cheat with whatever permissions we want. I did all access.

    NtRet = NtDuplicateObject(procHandle, (HANDLE)hInfo-\>Handles\[i\].Handle, NtCurrentProcess, &HijackedHandle, PROCESS_ALL_ACCESS, 0, 0);

    if (!IsHandleValid(HijackedHandle) || !NT_SUCCESS(NtRet))//check is the funcions succeeded and check the handle is valid

    {

        

        continue;

    }
        //get the process id of the handle we duplicated and check its to our target
    if (GetProcessId(HijackedHandle) != dwTargetProcessId) {

        CloseHandle(HijackedHandle);

        continue;

    }



    hProcess = HijackedHandle;



    break;

}





CleanUpAndExit("Success");

return hProcess;

}

smali
<script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.0/jquery.min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.5.5/angular.min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/knockout/2.1.0/knockout-min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/react/0.14.2/react.min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/react-dom/0.14.2/react-dom.min.js"></script>

Reasons:
  • Blacklisted phrase (1): youtube.com
  • Blacklisted phrase (2): fuck
  • Long answer (-1):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: Gilmar Carvalho

79776907

Date: 2025-09-27 17:11:34
Score: 0.5
Natty:
Report link
  1. Create a unique folder in the iOS Simulator's Files app (under "On My iPhone")

  2. Find the folder on your Mac using:

bash

   find ~/Library/Developer/CoreSimulator/Devices/ -name "your_folder_name"
  1. Copy your files directly to the found directory
Reasons:
  • Low length (0.5):
  • Has code block (-0.5):
  • Low reputation (0.5):
Posted by: Polyariz

79776905

Date: 2025-09-27 17:05:32
Score: 0.5
Natty:
Report link

... here now follow the classes for the ChainCode, add them to your project

(Code for the WinForm in the last answer):

Make sure, you reference the following namespaces:

using System.Collections;
using System.Drawing.Drawing2D;
using System.Drawing.Imaging;
using System.Runtime.InteropServices;
    //    This class implements a chaincode finder (crack code), as an adaption of 
    //    V. Kovalevsky's crack-code development.  
    //    (PLEASE NOTE THAT THESE ARE *NOT* HTTPS CONNECTIONS! It's an old web-site.)
    //       http://www.miszalok.de/Samples/CV/ChainCode/chain_code.htm and
    //       http://www.miszalok.de/Lectures/L08_ComputerVision/CrackCode/CrackCode_d.htm (german only). See also
    //       http://www.miszalok.de/Samples/CV/ChainCode/chaincode_kovalev_e.htm
    //As the name crackcode says, we are moving on the (invisible) "cracks" in between the pixels to find the outlines of objects

    //Please note that I dont use the /unsafe switch and byte-pointers, since I dont know, whether you are allowed to use that in your code...
    public class ChainFinder
    {
        private int _threshold = 0;
        private bool _nullCells = false;
        private Point _start = new Point(0, 0);
        private int _height = 0;

        public bool AllowNullCells
        {
            get
            {
                return _nullCells;
            }
            set
            {
                _nullCells = value;
            }
        }

        public List<ChainCode>? GetOutline(Bitmap bmp, int threshold, bool grayscale, int range, bool excludeInnerOutlines, int initialValueToCheck, bool doReverse)
        {
            BitArray? fbits = null; //Array to hold the information about processed pixels
            _threshold = threshold;
            _height = bmp.Height;

            try
            {
                List<ChainCode> fList = new List<ChainCode>();

                //Please note that the bitarray is one "column" larger than the bitmap's width
                fbits = new BitArray((bmp.Width + 1) * bmp.Height, false);

                //is the condition so, that the collected coordinate's pixel/color channel values are greater than the threshold,
                //or lower (then use the reversed switch, maybe with an approppriate initial value set)
                if (doReverse)
                    FindChainCodeRev(bmp, fList, fbits, grayscale, range, excludeInnerOutlines, initialValueToCheck);
                else
                    FindChainCode(bmp, fList, fbits, grayscale, range, excludeInnerOutlines, initialValueToCheck);

                return fList;
            }
            catch /*(Exception exc)*/
            {
                if (fbits != null)
                    fbits = null;
            }

            return null;
        }

        // PLEASE NOTE THAT THIS IS *NOT* A HTTPS CONNECTION! It's an old web-site.
        // Adaption von Herrn Prof. Dr.Ing. Dr.med. Volkmar Miszalok, siehe: http://www.miszalok.de/Samples/CV/ChainCode/chain_code.htm
        private void FindChainCode(Bitmap b, List<ChainCode> fList, BitArray fbits, bool grayscale, int range, bool excludeInnerOutlines, int initialValueToCheck)
        {
            SByte[,] Negative = new SByte[,] { { 0, -1 }, { 0, 0 }, { -1, 0 }, { -1, -1 } };
            SByte[,] Positive = new SByte[,] { { 0, 0 }, { -1, 0 }, { -1, -1 }, { 0, -1 } };

            Point LeftInFront = new Point();
            Point RightInFront = new Point();
            bool LeftInFrontGreaterTh;
            bool RightInFrontGreaterTh;
            int direction = 1;

            BitmapData? bmData = null;

            //if (!AvailMem.AvailMem.checkAvailRam(b.Width * b.Height * 4L))
            //    return;

            try
            {
                bmData = b.LockBits(new Rectangle(0, 0, b.Width, b.Height), ImageLockMode.ReadOnly, PixelFormat.Format32bppArgb);
                int stride = bmData.Stride;

                //copy the BitmapBits to a byte-array for processing
                byte[]? p = new byte[(bmData.Stride * bmData.Height) - 1 + 1];
                Marshal.Copy(bmData.Scan0, p, 0, p.Length);

                while (start_crack_search(bmData, p, fbits, grayscale, range, initialValueToCheck))
                {
                    //setup and add the first found pixel to our results list
                    ChainCode cc = new ChainCode();

                    cc.start = _start;
                    // cc.Coord.Add(_start)

                    int x = _start.X;
                    int y = _start.Y + 1;
                    direction = 1;

                    cc.Chain.Add(direction);

                    //as long as we have not reached the starting pixel again, do processing steps
                    while (x != _start.X || y != _start.Y)
                    {
                        LeftInFront.X = x + Negative[direction, 0];
                        LeftInFront.Y = y + Negative[direction, 1];
                        RightInFront.X = x + Positive[direction, 0];
                        RightInFront.Y = y + Positive[direction, 1];

                        //add the correct pixel
                        switch (direction)
                        {
                            case 0:
                                {
                                    cc.Coord.Add(new Point(LeftInFront.X - 1, LeftInFront.Y));
                                    break;
                                }

                            case 1:
                                {
                                    cc.Coord.Add(new Point(LeftInFront.X, LeftInFront.Y - 1));
                                    break;
                                }

                            case 2:
                                {
                                    cc.Coord.Add(new Point(LeftInFront.X + 1, LeftInFront.Y));
                                    break;
                                }

                            case 3:
                                {
                                    cc.Coord.Add(new Point(LeftInFront.X, LeftInFront.Y + 1));
                                    break;
                                }
                        }

                        //now do the core algorithm steps, description above
                        LeftInFrontGreaterTh = false;
                        RightInFrontGreaterTh = false;

                        if (LeftInFront.X >= 0 && LeftInFront.X < b.Width && LeftInFront.Y >= 0 && LeftInFront.Y < b.Height)
                        {
                            if (!grayscale)
                                LeftInFrontGreaterTh = p[LeftInFront.Y * stride + LeftInFront.X * 4 + 3] > _threshold;
                            else if (range > 0)
                                LeftInFrontGreaterTh = ((p[LeftInFront.Y * stride + LeftInFront.X * 4] > _threshold) && (p[LeftInFront.Y * stride + LeftInFront.X * 4] <= _threshold + range));
                            else
                                LeftInFrontGreaterTh = p[LeftInFront.Y * stride + LeftInFront.X * 4] > _threshold;
                        }

                        if (RightInFront.X >= 0 && RightInFront.X < b.Width && RightInFront.Y >= 0 && RightInFront.Y < b.Height)
                        {
                            if (!grayscale)
                                RightInFrontGreaterTh = p[RightInFront.Y * stride + RightInFront.X * 4 + 3] > _threshold;
                            else if (range > 0)
                                RightInFrontGreaterTh = ((p[RightInFront.Y * stride + RightInFront.X * 4] > _threshold) && (p[RightInFront.Y * stride + RightInFront.X * 4] <= _threshold + range));
                            else
                                RightInFrontGreaterTh = p[RightInFront.Y * stride + RightInFront.X * 4] > _threshold;
                        }

                        //set new direction (3 cases, but only 2 of them change the direction
                        //(LeftInFrontGreaterTh + !RightInFrontGreaterTh = move straight on))
                        if (RightInFrontGreaterTh && (LeftInFrontGreaterTh || _nullCells))
                            direction = (direction + 1) % 4;
                        else if (!LeftInFrontGreaterTh && (!RightInFrontGreaterTh || !_nullCells))
                            direction = (direction + 3) % 4;

                        cc.Chain.Add(direction);

                        // fbits (always record upper pixel)
                        switch (direction)
                        {
                            case 0:
                                {
                                    x += 1;
                                    cc.Area += y;
                                    break;
                                }

                            case 1:
                                {
                                    y += 1;
                                    fbits.Set((y - 1) * (b.Width + 1) + x, true);
                                    break;
                                }

                            case 2:
                                {
                                    x -= 1;
                                    cc.Area -= y;
                                    break;
                                }

                            case 3:
                                {
                                    y -= 1;
                                    fbits.Set(y * (b.Width + 1) + x, true);
                                    break;
                                }
                        }

                        //if we finally reach the starting pixel again, add a final coord and chain-direction if one of the distance-constraints below is met.
                        //This happens always due to the setup of the algorithm (adding the coord to the ChainCode for the last set direction)
                        if (x == _start.X && y == _start.Y)
                        {
                            if (Math.Abs(cc.Coord[cc.Coord.Count - 1].X - x) > 1 || Math.Abs(cc.Coord[cc.Coord.Count - 1].Y - y) > 1)
                            {
                                if (Math.Abs(cc.Coord[cc.Coord.Count - 1].X - x) > 1)
                                {
                                    cc.Coord.Add(new Point(cc.Coord[cc.Coord.Count - 1].X + 1, cc.Coord[cc.Coord.Count - 1].Y));
                                    cc.Chain.Add(0);
                                }
                                if (Math.Abs(cc.Coord[cc.Coord.Count - 1].Y - y) > 1)
                                {
                                    cc.Coord.Add(new Point(cc.Coord[cc.Coord.Count - 1].X, cc.Coord[cc.Coord.Count - 1].Y + 1));
                                    cc.Chain.Add(1);
                                }
                                break;
                            }
                        }
                    }

                    bool isInnerOutline = false;

                    if (excludeInnerOutlines)
                    {
                        if (cc.Chain[cc.Chain.Count - 1] == 0)
                        {
                            isInnerOutline = true;
                            break;
                        }
                    }

                    //add the list to the results list
                    if (!isInnerOutline)
                    {
                        cc.Coord.Add(_start);
                        fList.Add(cc);
                    }
                }

                p = null;
                b.UnlockBits(bmData);
            }
            catch (Exception ex)
            {
                MessageBox.Show(ex.Message);

                try
                {
                    if(bmData != null)
                        b.UnlockBits(bmData);
                }
                catch
                {
                }
            }
        }

        private bool start_crack_search(BitmapData bmData, byte[] p, BitArray fbits, bool grayscale, int range, int initialValueToCheck)
        {
            int left = 0;
            int stride = bmData.Stride;

            for (int y = _start.Y; y <= bmData.Height - 1; y++)
            {
                for (int x = 0; x <= bmData.Width - 1; x++)
                {
                    if (x > 0)
                    {
                        if (!grayscale)
                            left = p[y * stride + (x - 1) * 4 + 3];
                        else
                            left = p[y * stride + (x - 1) * 4];
                    }
                    else
                        left = initialValueToCheck;

                    if (!grayscale)
                    {
                        if ((left <= _threshold) && (p[y * stride + x * 4 + 3] > _threshold) && (fbits.Get(y * (bmData.Width + 1) + x) == false))
                        {
                            _start.X = x;
                            _start.Y = y;
                            fbits.Set(y * (bmData.Width + 1) + x, true);
                            //OnProgressPlus();
                            return true;
                        }
                    }
                    else if (range > 0)
                    {
                        if ((left <= _threshold) && (p[y * stride + x * 4] > _threshold) && (p[y * stride + x * 4] <= _threshold + range) && (fbits.Get(y * (bmData.Width + 1) + x) == false))
                        {
                            _start.X = x;
                            _start.Y = y;
                            fbits.Set(y * (bmData.Width + 1) + x, true);
                            //OnProgressPlus();
                            return true;
                        }
                    }
                    else if ((left <= _threshold) && (p[y * stride + x * 4] > _threshold) && (fbits.Get(y * (bmData.Width + 1) + x) == false))
                    {
                        _start.X = x;
                        _start.Y = y;
                        fbits.Set(y * (bmData.Width + 1) + x, true);
                        //OnProgressPlus();
                        return true;
                    }
                }
            }
            return false;
        }

        // PLEASE NOTE THAT THIS IS *NOT* A HTTPS CONNECTION! It's an old web-site.
        // Adaption von Herrn Prof. Dr.Ing. Dr.med. Volkmar Miszalok, siehe: http://www.miszalok.de/Samples/CV/ChainCode/chain_code.htm
        private void FindChainCodeRev(Bitmap b, List<ChainCode> fList, BitArray fbits, bool grayscale, int range, bool excludeInnerOutlines, int initialValueToCheck)
        {
            SByte[,] Negative = new SByte[,] { { 0, -1 }, { 0, 0 }, { -1, 0 }, { -1, -1 } };
            SByte[,] Positive = new SByte[,] { { 0, 0 }, { -1, 0 }, { -1, -1 }, { 0, -1 } };

            Point LeftInFront = new Point();
            Point RightInFront = new Point();
            bool LeftInFrontGreaterTh;
            bool RightInFrontGreaterTh;
            int direction = 1;

            BitmapData? bmData = null;

            //if (!AvailMem.AvailMem.checkAvailRam(b.Width * b.Height * 4L))
            //    return;

            try
            {
                bmData = b.LockBits(new Rectangle(0, 0, b.Width, b.Height), ImageLockMode.ReadOnly, PixelFormat.Format32bppArgb);
                int stride = bmData.Stride;

                byte[]? p = new byte[(bmData.Stride * bmData.Height) - 1 + 1];
                Marshal.Copy(bmData.Scan0, p, 0, p.Length);

                while (start_crack_searchRev(bmData, p, fbits, grayscale, range, initialValueToCheck))
                {
                    ChainCode cc = new ChainCode();

                    cc.start = _start;

                    int x = _start.X;
                    int y = _start.Y + 1;
                    direction = 1;

                    cc.Chain.Add(direction);

                    while (x != _start.X || y != _start.Y)
                    {
                        LeftInFront.X = x + Negative[direction, 0];
                        LeftInFront.Y = y + Negative[direction, 1];
                        RightInFront.X = x + Positive[direction, 0];
                        RightInFront.Y = y + Positive[direction, 1];

                        switch (direction)
                        {
                            case 0:
                                {
                                    cc.Coord.Add(new Point(LeftInFront.X - 1, LeftInFront.Y));
                                    break;
                                }

                            case 1:
                                {
                                    cc.Coord.Add(new Point(LeftInFront.X, LeftInFront.Y - 1));
                                    break;
                                }

                            case 2:
                                {
                                    cc.Coord.Add(new Point(LeftInFront.X + 1, LeftInFront.Y));
                                    break;
                                }

                            case 3:
                                {
                                    cc.Coord.Add(new Point(LeftInFront.X, LeftInFront.Y + 1));
                                    break;
                                }
                        }

                        LeftInFrontGreaterTh = false;
                        RightInFrontGreaterTh = false;

                        if (LeftInFront.X >= 0 && LeftInFront.X < b.Width && LeftInFront.Y >= 0 && LeftInFront.Y < b.Height)
                        {
                            if (!grayscale)
                                LeftInFrontGreaterTh = p[LeftInFront.Y * stride + LeftInFront.X * 4 + 3] < _threshold;
                            else if (range > 0)
                                LeftInFrontGreaterTh = ((p[LeftInFront.Y * stride + LeftInFront.X * 4] < _threshold) && (p[LeftInFront.Y * stride + LeftInFront.X * 4] >= _threshold + range));
                            else
                                LeftInFrontGreaterTh = p[LeftInFront.Y * stride + LeftInFront.X * 4] < _threshold;
                        }

                        if (RightInFront.X >= 0 && RightInFront.X < b.Width && RightInFront.Y >= 0 && RightInFront.Y < b.Height)
                        {
                            if (!grayscale)
                                RightInFrontGreaterTh = p[RightInFront.Y * stride + RightInFront.X * 4 + 3] < _threshold;
                            else if (range > 0)
                                RightInFrontGreaterTh = ((p[RightInFront.Y * stride + RightInFront.X * 4] < _threshold) && (p[RightInFront.Y * stride + RightInFront.X * 4] >= _threshold + range));
                            else
                                RightInFrontGreaterTh = p[RightInFront.Y * stride + RightInFront.X * 4] < _threshold;
                        }

                        if (RightInFrontGreaterTh && (LeftInFrontGreaterTh || _nullCells))
                            direction = (direction + 1) % 4;
                        else if (!LeftInFrontGreaterTh && (!RightInFrontGreaterTh || !_nullCells))
                            direction = (direction + 3) % 4;

                        cc.Chain.Add(direction);

                        // fbits (immer oberen punkt aufzeichnen)
                        switch (direction)
                        {
                            case 0:
                                {
                                    x += 1;
                                    cc.Area += y;
                                    break;
                                }

                            case 1:
                                {
                                    y += 1;
                                    fbits.Set((y - 1) * (b.Width + 1) + x, true);
                                    break;
                                }

                            case 2:
                                {
                                    x -= 1;
                                    cc.Area -= y;
                                    break;
                                }

                            case 3:
                                {
                                    y -= 1;
                                    fbits.Set(y * (b.Width + 1) + x, true);
                                    break;
                                }
                        }

                        if (x == _start.X && y == _start.Y)
                        {
                            if (Math.Abs(cc.Coord[cc.Coord.Count - 1].X - x) > 1 || Math.Abs(cc.Coord[cc.Coord.Count - 1].Y - y) > 1)
                            {
                                if (Math.Abs(cc.Coord[cc.Coord.Count - 1].X - x) > 1)
                                {
                                    cc.Coord.Add(new Point(cc.Coord[cc.Coord.Count - 1].X + 1, cc.Coord[cc.Coord.Count - 1].Y));
                                    cc.Chain.Add(0);
                                }
                                if (Math.Abs(cc.Coord[cc.Coord.Count - 1].Y - y) > 1)
                                {
                                    cc.Coord.Add(new Point(cc.Coord[cc.Coord.Count - 1].X, cc.Coord[cc.Coord.Count - 1].Y + 1));
                                    cc.Chain.Add(1);
                                }
                                break;
                            }
                        }
                    }

                    bool isInnerOutline = false;

                    if (excludeInnerOutlines)
                    {
                        if (cc.Chain[cc.Chain.Count - 1] == 0)
                        {
                            isInnerOutline = true;
                            break;
                        }
                    }

                    if (!isInnerOutline)
                    {
                        cc.Coord.Add(_start);
                        fList.Add(cc);
                    }
                }

                p = null;
                b.UnlockBits(bmData);
            }
            catch (Exception ex)
            {
                MessageBox.Show(ex.Message);

                try
                {
                    if (bmData != null)
                        b.UnlockBits(bmData);
                }
                catch
                {
                }
            }
        }

        private bool start_crack_searchRev(BitmapData bmData, byte[] p, BitArray fbits, bool grayscale, int range, int initialValueToCheck)
        {
            int left = 0;
            int stride = bmData.Stride;

            for (int y = _start.Y; y <= bmData.Height - 1; y++)
            {
                for (int x = 0; x <= bmData.Width - 1; x++)
                {
                    if (x > 0)
                    {
                        if (!grayscale)
                            left = p[y * stride + (x - 1) * 4 + 3];
                        else
                            left = p[y * stride + (x - 1) * 4];
                    }
                    else
                        left = initialValueToCheck;

                    if (!grayscale)
                    {
                        if ((left >= _threshold) && (p[y * stride + x * 4 + 3] < _threshold) && (fbits.Get(y * (bmData.Width + 1) + x) == false))
                        {
                            _start.X = x;
                            _start.Y = y;
                            fbits.Set(y * (bmData.Width + 1) + x, true);
                            //OnProgressPlus();
                            return true;
                        }
                    }
                    else if (range > 0)
                    {
                        if ((left >= _threshold) && (p[y * stride + x * 4] < _threshold) && (p[y * stride + x * 4] >= _threshold + range) && (fbits.Get(y * (bmData.Width + 1) + x) == false))
                        {
                            _start.X = x;
                            _start.Y = y;
                            fbits.Set(y * (bmData.Width + 1) + x, true);
                            //OnProgressPlus();
                            return true;
                        }
                    }
                    else if ((left >= _threshold) && (p[y * stride + x * 4] < _threshold) && (fbits.Get(y * (bmData.Width + 1) + x) == false))
                    {
                        _start.X = x;
                        _start.Y = y;
                        fbits.Set(y * (bmData.Width + 1) + x, true);
                        //OnProgressPlus();
                        return true;
                    }
                }
            }
            return false;
        }

        public void Reset()
        {
            this._start = new Point(0, 0);
        }
    }

    public class ChainCode
    {
        public static int F { get; set; }

        public Point start
        {
            get
            {
                return m_start;
            }
            set
            {
                m_start = value;
            }
        }
        private Point m_start;

        private List<Point> _coord = new List<Point>();
        private List<int> _chain = new List<int>();

        public List<Point> Coord
        {
            get
            {
                return _coord;
            }
            set
            {
                _coord = value;
            }
        }
        public List<int> Chain
        {
            get
            {
                return _chain;
            }
            set
            {
                _chain = value;
            }
        }

        public int Area
        {
            get
            {
                return m_Area;
            }
            set
            {
                m_Area = value;
            }
        }
        private int m_Area;
        private int _id;

        public int Perimeter
        {
            get
            {
                return _chain.Count;
            }
        }

        public int ID
        {
            get
            {
                return this._id;
            }
        }

        public void SetId()
        {
            if (ChainCode.F < Int32.MaxValue)
            {
                ChainCode.F += 1;
                this._id = ChainCode.F;
            }
            else
                throw new OverflowException("The type of the field for storing the ID reports an overflow error.");
        }

        public void ResetID()
        {
            ChainCode.F = 0;
        }

        public ChainCode()
        {
        }

        public override string ToString()
        {
            return "x = " + start.X.ToString() + "; y = " + start.Y.ToString() + "; count = " + _coord.Count.ToString() + "; area = " + this.Area.ToString();
        }
    }

Regards,
Thorsten

Reasons:
  • Blacklisted phrase (1): Regards
  • Long answer (-1):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: Thorsten Gudera

79776891

Date: 2025-09-27 16:40:26
Score: 2.5
Natty:
Report link

SET COLOR TO W/N.N/W

mcursoff = ",N/N"

mreverse = " I "

mstablink = "w*/N "

mbrigt = "W+ /N "

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Layrence Ak Sulau

79776873

Date: 2025-09-27 16:15:20
Score: 5.5
Natty: 4.5
Report link

我也遇到同样的问题,在我删除掉这段代码后

will-change: transform

图片变得清晰无比。

Reasons:
  • Low length (1.5):
  • Has code block (-0.5):
  • Has no white space (0.5):
  • No latin characters (3):
  • Low reputation (1):
Posted by: ton le

79776872

Date: 2025-09-27 16:13:19
Score: 4
Natty:
Report link

This is not an answer, but an observation, code seems to work fine.

I have changed the tools (to some dummy function) and model, rest is same.

enter image description here

Reasons:
  • Blacklisted phrase (1): not an answer
  • Probably link only (1):
  • Low length (1):
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: justTesting

79776865

Date: 2025-09-27 15:52:14
Score: 4
Natty:
Report link

For details on how to add a system tray icon in WinUI 3,

refer to SystemTrayWinUI3 on GitHub

Reasons:
  • Contains signature (1):
  • Low length (1.5):
  • No code block (0.5):
  • Low reputation (1):
Posted by: MEHDIMYADI

79776860

Date: 2025-09-27 15:44:11
Score: 3
Natty:
Report link

The compiler adds padding between and after struct members to satisfy alignment requirements, so the struct’s size is larger than the sum of its member sizes.

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Prathimabi Dudekula

79776856

Date: 2025-09-27 15:38:10
Score: 1
Natty:
Report link

I answer myself.

After some searching I found this page https://github.com/solana-labs/solana/issues/17325#issuecomment-844317674

Here The user "ghost" suggest:

solana-keygen recover ASK -o recov.json

This generates the .json in 64 bytes for the raw address.

With this json I could transfer to my ledger as:

solana transfer <LEDGER_ADDRESS> <SOL_AMOUNT> --from x:\solana-route\recov.json --allow-unfunded-recipient

In SOL_AMOUNT a small amount of fee must be left.

Reasons:
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Low reputation (1):
Posted by: flamengo

79776849

Date: 2025-09-27 15:22:06
Score: 1.5
Natty:
Report link

This is solved by changing

form.setSafeArea(true)

to

form.getContentPane().setSafeArea(true)

Reasons:
  • Low length (1):
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Low reputation (0.5):
Posted by: Eric

79776843

Date: 2025-09-27 15:09:04
Score: 1.5
Natty:
Report link

I am also facing this problem,

here, this command is work for me

npx create-expo-app@latest app-name --template https://github.com/expo/expo/tree/main/templates/blank

If you want a blank template use this,

npx create-expo-app@latest app-name --template https://github.com/expo/expo/tree/main/templates/expo-template-blank

Other option templates is here,

link : https://github.com/expo/expo/tree/main/templates

This github repo you can choice whice template you want

Reasons:
  • Blacklisted phrase (1): also facing this
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: Nishanth

79776841

Date: 2025-09-27 15:08:03
Score: 2.5
Natty:
Report link

It looks like you need to use a custom gradle. Even Unity 6.3 has 8.7.2 android plugin version. Check docs

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (0.5):
Posted by: JottoWorol

79776832

Date: 2025-09-27 15:01:02
Score: 3
Natty:
Report link

I replace the line below because i used bootstarp 5 .and it's work with me

from

data-toggle="dropdown"

to

data-bs-toggle="dropdown"

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Self-answer (0.5):
  • Low reputation (1):
Posted by: user2419119

79776831

Date: 2025-09-27 14:59:01
Score: 3.5
Natty:
Report link

Would this in any way work with Svelte 4.2.20

Reasons:
  • Low length (1.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Mbofho Mamatsharaga

79776825

Date: 2025-09-27 14:44:58
Score: 1.5
Natty:
Report link

For OpenCV - I'm not familiar with it, but I know, that there is a FindContours-Method in OpenCV. As far as I know this Method is only for binary images.

Here's my imagination of how you could do this in OpenCV:

- Extract the blue color channel from the image.
- Threshold this by a threshold of about 128, make sure you return a binary image.
- Pass this binary image to the FindContours method of OpenCV.
- Select the correct contour from the results.
- From this contour, display [and save] the enclosed portion of the *original image*.

Considerations:

- Add some logic to automatically get the correct threshold.
- Add some logic to make the selection of the correct chainCode/Contour more reliable for different backgrounds. E.G.: Test the "rectangularity" of the, say 10, largest area ChainCodes, or look at the Gradient, or the Entropy, to decide, if the processed ChainCode is the right one. Or, if the written part always contains some same words/letters, you could correlate the picture with a testimage to get the right contour... There's a lot of options to select the correct part of the orig img, depending on e.g.: performance, or "the parameters" of the problem itself.

Here's a screenshot of a quickly setup Winforms app doimg this

Regards,
Thorsten

Reasons:
  • Blacklisted phrase (1): Regards
  • Long answer (-1):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Thorsten Gudera

79776812

Date: 2025-09-27 14:25:53
Score: 4.5
Natty:
Report link

An example of what happened to me and my sis was that I made “promised” to play Lego with my sister for whenever she wanted unless I’m working and now I’m stuck with playing Lego with her

Reasons:
  • RegEx Blacklisted phrase (1.5): m stuck
  • Low length (0.5):
  • No code block (0.5):
  • Unregistered user (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Naiya patel

79776810

Date: 2025-09-27 14:21:52
Score: 1.5
Natty:
Report link

Maybe you can consider using Document::getList method

List<Integer> years = document.getList("years", Integer.class);

Here is the offical documentation.

Reasons:
  • Low length (1):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: thbaba

79776801

Date: 2025-09-27 13:51:45
Score: 1
Natty:
Report link

In SageMaker notebook instances, you should set environment variables using the conda activate/deactivate hook scripts inside the lifecycle configuration. Place all your exports in /home/ec2-user/anaconda3/envs/python3/etc/conda/activate.d/env_vars.sh and matching unsets in deactivate.d. This ensures variables load every time the conda_python3 kernel starts. Add as many export VAR=VALUE lines as needed in the same script instead of separate echo calls.

Reasons:
  • Has code block (-0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: user31583972

79776789

Date: 2025-09-27 13:22:39
Score: 0.5
Natty:
Report link

The TreeExplainer in the [shap](https://shap.readthedocs.io/en/latest/index.html) package works with scikit-learn IsolationForest. So if you implement the scikit-learn Estimator interface in same was as IsolationForest, then it should also work with your method.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Single line (0.5):
  • High reputation (-1):
Posted by: Jon Nordby

79776785

Date: 2025-09-27 13:15:37
Score: 0.5
Natty:
Report link

When comparing nested lists with <, it first checks equality (==) of elements at each level to find where they differ before doing the actual ordering comparison. For nested structures, this means __eq__ gets called once per nesting level—even though only one comparison determines the result. Your example shows 100 calls because Python checks equality through all 100 layers before realizing X(1) < X(0) is false.

How about precompute a lightweight comparison key during initialization? For cases like chemical formulas (where equality is complex due to multiple representations), canonicalize the value once—e.g., sort atoms into a standard order—and store that key.

class X:
    def __init__(self, value):
        self.value = value
        self._key = self._canonicalize(value)
    
    def _canonicalize(self, value):
        return tuple(sorted(value)) 

    def __lt__(self, other):
        return self._key < other._key
    
    def __eq__(self, other):
        return self._key == other._key

nested_x1 = [[[X("C2H6")]]]  
nested_x2 = [[[X("C2H5OH")]]]
print(nested_x1 < nested_x2)  # Fast: compares keys, not raw values

If your data can't be pre-canonicalized (e.g., disk-backed values), consider lazy key generation with memoization—but for most cases, a one-time key computation solves the algorithmic redundancy cleanly.

Reasons:
  • Long answer (-1):
  • Has code block (-0.5):
  • Contains question mark (0.5):
  • Starts with a question (0.5): When
  • Low reputation (1):
Posted by: machinecrz

79776783

Date: 2025-09-27 13:13:37
Score: 1
Natty:
Report link

Do not apply your mask to the frames. Instead, transform the mask into audio signal space, and then apply the mask there (to Y).

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Single line (0.5):
  • High reputation (-1):
Posted by: Jon Nordby

79776777

Date: 2025-09-27 13:08:35
Score: 1.5
Natty:
Report link

I know this is 2yrs late, but to other people looking for answer, here's my take.

As someone who's worked with both*(not within the same project),* I strongly recommend you go with PrimeNG, it just offers lots of components that aren't available in Material. Also, I frequently had various styling customization issues with Material unlike PrimeNG where everything is just too smooth and flexible.

Reasons:
  • No code block (0.5):
  • Low reputation (1):
Posted by: ssrsvn

79776766

Date: 2025-09-27 12:42:30
Score: 3
Natty:
Report link

I tried to follow the same, via firebase but I have the same issue

async subscribe(product, priceId, wid) {
    const uid = auth.currentUser?.uid;
    if (!uid) throw new Error('User must be authenticated to subscribe.');
    if (!product) throw new Error('Product is required for subscription.');
    if (!priceId) throw new Error('Price ID is required for subscription.');
    if (!wid) throw new Error('Workspace ID is required for subscription.');

    const checkoutRef = collection(db, 'customers', uid, 'checkout_sessions');
    const path = window.location.pathname;
    const docRef = await addDoc(checkoutRef, {
      mode: 'subscription',
      price: priceId,
      success_url: `${window.location.origin}${path}?subscription=success&tier=${product.metadata?.tier}&wid=${wid}`,
      cancel_url: `${window.location.origin}${path}?subscription=cancelled`,
      subscription_data: {
        description: `Workspace: ${wid}`,
      },
    });

    // Listen for the checkout session URL to be populated by Firebase Extension
    return new Promise((resolve, reject) => {
      const unsubscribe = onSnapshot(
        docRef,
        snapshot => {
          const data = snapshot.data();

          if (data?.url) {
            // URL is available, redirect to Stripe Checkout
            unsubscribe();
            window.location.assign(data.url);
            resolve({ id: docRef.id, url: data.url });
          } else if (data?.error) {
            // Error occurred in Firebase Extension
            unsubscribe();
            reject(new Error(data.error.message));
          }
        },
        error => {
          unsubscribe();
          reject(new Error(error.message));
        }
      );

      // Set a timeout to prevent infinite waiting
      setTimeout(() => {
        unsubscribe();
        reject(new Error('Subscription creation timed out. Please try again.'));
      }, 30000); // 30 seconds timeout
    });
  }
Reasons:
  • Blacklisted phrase (1): I have the same issue
  • Long answer (-1):
  • Has code block (-0.5):
  • Me too answer (2.5): I have the same issue
  • Low reputation (1):
Posted by: YumiBakura

79776755

Date: 2025-09-27 12:32:27
Score: 2
Natty:
Report link
var response = await _cosmosClient
    .GetContainer("dbName", "containerName")
    .ReadItemAsync<DerivedClass1>(id.ToString(), new PartitionKey(partitionKey));

for more info: https://learn.microsoft.com/en-us/dotnet/api/microsoft.azure.cosmos.container.readitemasync?view=azure-dotnet

Reasons:
  • Probably link only (1):
  • Low length (1):
  • Has code block (-0.5):
  • Low reputation (0.5):
Posted by: Alparslan ŞEN

79776753

Date: 2025-09-27 12:25:25
Score: 1.5
Natty:
Report link
Characters = [c for c in name]
if any(prohibitedCharacters in Characters):
    print("No special characters allowed.")
else:
    print(f"Welcome, {name}")
Reasons:
  • Low length (1):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: AAAAAAAAA

79776752

Date: 2025-09-27 12:25:25
Score: 3
Natty:
Report link

mysql -u root -p mydb < ~/Downloads/shoh_db_i.sql

Reasons:
  • Low length (1.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (0.5):
Posted by: Khairul Islam Tonmoy

79776743

Date: 2025-09-27 12:18:23
Score: 2.5
Natty:
Report link

roganjosh is correct, you have to run the previous cell in your colab notebook first for it to register. You can hover in between the square brackets to the left of the line that declares myStrings, and a play button will appear. click it, and rerun the line below it, and it should work properly

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Nathan

79776738

Date: 2025-09-27 12:11:22
Score: 2
Natty:
Report link

dotnet restore on a solution does not trigger project-level BeforeTargets="Restore" hooks.

It only triggers a package restore operation, ignoring other custom MSBuild logic.

To run your download logic, invoke restore on the individual project or invoke your custom target explicitly.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Manraj Singh

79776733

Date: 2025-09-27 11:50:17
Score: 0.5
Natty:
Report link

The problem is because the EAS didn't read the update of android folder.
I need to run :
npx expo prebuild --clean

Not

npx expo prebuild

Then Commit the version. Because I am using Bare Workflow. The EAS need to read the android folder. Do not put android folder to .gitignore.

After that run again :
eas build -p android --profile production

And it successfull.

Reasons:
  • Blacklisted phrase (0.5): I need
  • No code block (0.5):
  • Self-answer (0.5):
  • High reputation (-1):
Posted by: Dennis Liu

79776703

Date: 2025-09-27 10:41:01
Score: 0.5
Natty:
Report link

If you are using RestClient, the issue occurs from Spring Boot 3.4.4, or more specifically Spring Framework 6.2.4, due to the following fix:

https://github.com/spring-projects/spring-framework/issues/34439

MappingJackson2XmlHttpMessageConverter is added, and added before MappingJackson2HttpMessageConverter, so even if jackson-dataformat-xml was already in your dependencies, the default content type changes from json to XML.

Reasons:
  • No code block (0.5):
Posted by: rougou

79776697

Date: 2025-09-27 10:27:59
Score: 2
Natty:
Report link

Your syntax is incorrect. remove the ? before auth.

Correct syntax example:

https://<firebaseUrl>/<projectBucket>/<uid>/<tag>.json?shallow=true&auth=<idToken>

enter image description here

from: https://ai2.metricrat.co.uk/guides/firebase-with-a-web-component/firebase-demo-secured-with-web-component

Reasons:
  • Probably link only (1):
  • Low length (1):
  • Has code block (-0.5):
  • Low reputation (0.5):
Posted by: Metric Rat

79776692

Date: 2025-09-27 10:23:58
Score: 3
Natty:
Report link

Has anyone come across any anti bot tech in the cme website?

I’m trying a few things, and got ‘teaser1’ returned at the back of the url.

Just wondered if they dicking with people trying to get better data

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Contains question mark (0.5):
  • Unregistered user (0.5):
  • Low reputation (1):
Posted by: Charlie Bradshaw

79776674

Date: 2025-09-27 10:07:54
Score: 3
Natty:
Report link

I found a good alternative called Devokai, which reportedly makes money through prompt compression technology and multi-model combinations. I'm currently using it and think the results are quite good, with costs reduced by about 90%.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Self-answer (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Lingxiao Peng

79776669

Date: 2025-09-27 10:04:53
Score: 1
Natty:
Report link

Welcome to Uni Academic Help (UAH), your trusted partner in academic success. We provide expert assistance with assignments, dissertations, and research projects across various subjects. Our professional team ensures high-quality, plagiarism-free work tailored to your needs. Achieve excellence with UAH – your journey to academic success starts here!Welcome to Uni Academic Help (UAH), your trusted partner in academic success. We provide expert assistance with assignments, dissertations, and research projects across various subjects. Our professional team ensures high-quality, plagiarism-free work tailored to your needs. Achieve excellence with UAH – your journey to academic success starts here!

Contact Us: https://uniacademichelp.com/contact

Blog: https://uniacademichelp.com/blogs?id=61565792466399&mibextid=ZbWKwlL

Instagram: https://www.instagram.com/uah_uniacademichelp?igsh=bTIyZWlsYXh6djYw

https://www.linkedin.com/company/uah-counselling/


http://uniacademichelp.com/

Reasons:
  • Long answer (-0.5):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Arjun

79776661

Date: 2025-09-27 09:52:50
Score: 3.5
Natty:
Report link

for mre i just reconnect wifi and connect back

Reasons:
  • Low length (1.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Khairul Ikwan

79776654

Date: 2025-09-27 09:39:46
Score: 3
Natty:
Report link

Login to MySQL with sudo mysql -u root and run:
ALTER USER 'root'@'localhost' IDENTIFIED WITH mysql_native_password BY 'new_password'; FLUSH PRIVILEGES;

Reasons:
  • Probably link only (1):
  • Low length (1):
  • Has code block (-0.5):
  • Unregistered user (0.5):
  • Low reputation (1):
Posted by: smooz

79776645

Date: 2025-09-27 09:31:44
Score: 2.5
Natty:
Report link

The issue was resolved by updating the pipeline settings in Azure DevOps. Specifically, the NuGet package task was updated to the latest available version. My Git commits are now built and pushed into production without issue.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Self-answer (0.5):
  • Single line (0.5):
  • Low reputation (0.5):
Posted by: rpowell6

79776627

Date: 2025-09-27 09:06:38
Score: 2.5
Natty:
Report link

prohibited = ["@","$"]

name = input("Enter username:")

if any(char in name for char in prohibited):

print("No special character allowed")

else:

print("Welcome", +name)

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Talika Rathod

79776626

Date: 2025-09-27 08:51:35
Score: 1
Natty:
Report link

This isn’t a bug in your code. In React, Strict Mode mounts components twice in development to help catching bugs. That’s why your useEffect runs twice while developing, but don't worry it will run only once in production.
https://react.dev/reference/react/StrictMode

Reasons:
  • Low length (0.5):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: Pawan Saini

79776618

Date: 2025-09-27 08:31:31
Score: 1.5
Natty:
Report link

I believe some of the information you're looking for can be found under the "MLOps" umbrella in AzureML:

Information about promotion through stages, branching, and general version control strategies may be found in the "MLOps Accelerator" documentation:

Documentation about security can be found here (didn't check):

For more info on the latter, find the tab "Infrastructure and Security" on the left sidebar menu:

enter image description here

Reasons:
  • Probably link only (1):
  • Long answer (-0.5):
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: Jau A

79776614

Date: 2025-09-27 08:26:29
Score: 4
Natty:
Report link

Let's move to Setting>Features>Chat> and then click Chat> Command Center: Enabled. I'm sure that it will workenter image description here

Reasons:
  • Blacklisted phrase (1): enter image description here
  • Low length (1):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Dat Dong Van

79776608

Date: 2025-09-27 08:18:27
Score: 0.5
Natty:
Report link

Regardless of whether you're using React, FastAPI, or something else, I recommend pinning your bcrypt version to 4.3.0, preventing the 2025-09-25 update to 5.0.0 from being applied. I ran into the same problem on an app which was previously stable, which I suspect was caused by some sort of change in default behavior between passlib and bcrypt, and this ended up resolving the issue. Extensive logging and debugging showed that the inputs I had were definitely under 72 bytes, just like your case.

In Python, for example, the requirements.txt file can be changed from:

"bcrypt" to "bcrypt==4.3.0"

Reasons:
  • Long answer (-0.5):
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: N. P.

79776600

Date: 2025-09-27 08:05:23
Score: 2
Natty:
Report link

Normal accessories connect directly to the host and are accessed using standard interfaces and drivers. Bridged accessories connect through an intermediate device (a bridge), requiring communication with the bridge first before reaching the accessory. This adds complexity, often needing special protocols or drivers to manage the interaction. Read more

Reasons:
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: safayla onimoon

79776597

Date: 2025-09-27 07:59:22
Score: 1.5
Natty:
Report link

the open /var/lib/docker/tmp/docker-import-xxxxxxxxx/repositories: no such file or directory is very misleading and may suggest the permission Error but for my case the image was corrupt.
I recreate it and the problem gone.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Filler text (0.5): xxxxxxxxx
Posted by: Hossein Vatani

79776593

Date: 2025-09-27 07:44:18
Score: 1
Natty:
Report link

It looks like your component is wrapped in StrictMode component:

Strict Mode enables the following development-only behaviors:

Reasons:
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: Bartłomiej Stasiak

79776585

Date: 2025-09-27 07:31:15
Score: 0.5
Natty:
Report link

I have found a non working piece of code in the internet (see below).

Start citation:

-----------------

Sub WebScraping()
    Dim URL As String
    Dim IE As Object
    Dim html As Object
    
    Dim element As Object
    Dim i As Integer
   
    URL = "https://www.yahoo.com/"
   
    'You can fill just one argument with either part of webpage title or URL as keyword to search for the target browser and leave another one blank (“”).
    'If you provide both title and URL, the function returns the DOM of the only browser/tab that meets both criteria.
    Set html = findEdgeDOM("", URL)

    If html Is Nothing Then
        Debug.Print "Not found " & URL
        Exit Sub
    End If
   
    Debug.Print html.Title, html.URL
   
    Cells.Clear
    i = 1
    For Each element In html.getElementsByClassName("ntk-footer-link")
        Cells(i, 1).Value = element.innerText
        i = i + 1
    Next element

End Sub
Reasons:
  • Long answer (-0.5):
  • Has code block (-0.5):
  • Filler text (0.5): -----------------
  • Low reputation (1):
Posted by: ber999

79776580

Date: 2025-09-27 07:24:13
Score: 2.5
Natty:
Report link

I managed to solved this by hosting them on same domain as api.domain.com for backend and fe.domain.com for frontend. Also under defaultCookieAttributes, set samesite to lax, secure true and partitioned true.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Official Raptopack

79776579

Date: 2025-09-27 07:24:13
Score: 0.5
Natty:
Report link

The problem you're describing involves embedded YouTube playlist players (via iframe HTML or the IFrame API) crashing or terminating on Android mobile browsers during playback. This specifically happens when the "Watch on YouTube" overlay/badge appears in the bottom-right corner, typically within a few minutes of starting. The issue is isolated to mobile views and doesn't affect desktop browsers or mobile browsers in desktop mode.
Potential Causes

Troubleshooting Steps

Workarounds and Alternatives

Reasons:
  • Blacklisted phrase (1): youtube.com
  • Long answer (-1):
  • Has code block (-0.5):
  • Contains question mark (0.5):
  • Low reputation (0.5):
Posted by: GOKU

79776571

Date: 2025-09-27 06:59:08
Score: 1.5
Natty:
Report link

first make sure that api is public. and i'm hopping that it's public what i can see the issue is headers maybe you have to give proper headers Just user-agent won't works

there can be other issues as well like rate-limits, CORS erros (check console) also make sure parameters are correct.

Just test it on normal browser to find exact issue

Reasons:
  • No code block (0.5):
  • Low reputation (1):
Posted by: Jeel404

79776570

Date: 2025-09-27 06:59:08
Score: 3.5
Natty:
Report link

My bot @nihaoiybot can help you check whether a phone number is registered on Telegram.

Reasons:
  • Low length (1.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: dong w

79776564

Date: 2025-09-27 06:49:06
Score: 3
Natty:
Report link

Are you not missing a "," at then end of namespace in stage.labels ?

  stage.labels {
    values = {
      namespace = "namespace",
    }
  }
Reasons:
  • Low length (1):
  • Has code block (-0.5):
  • Ends in question mark (2):
  • Low reputation (0.5):
Posted by: Pado

79776558

Date: 2025-09-27 06:29:02
Score: 1
Natty:
Report link

The connection pooling is handled by the underlying Pymongo driver, though you can explicitly set it, it should be on by default. (See Configuring Connections: https://humbledb.readthedocs.io/en/latest/tutorial.html#configuring-connections)

I realize this is a 9 year old question without answers, but I recently updated the humbledb dependencies to be compatible with the latest Pymongo driver software so I’m leaving this here in case someone needs an answer.

Reasons:
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: shakefu

79776547

Date: 2025-09-27 06:11:57
Score: 0.5
Natty:
Report link

and I tried with universal-ctags but it was the same.

That's weird.

--langmap=systemverilog:.sv.svh.svi.vh (and --langmap=SystemVerilog:.sv.svh.svi.vh) works on universal-ctags on my environment.

--map-SystemVerilog=+.vh also works on universal-ctags.

Reasons:
  • Low length (0.5):
  • Has code block (-0.5):
  • Low reputation (0.5):
Posted by: Hiroo

79776544

Date: 2025-09-27 06:05:55
Score: 4.5
Natty: 4.5
Report link

Great discussion! DeepFashion has so much potential for training especially when paired with GANs for style transfer or outfit generation. Do you think diffusion models will eventually outperform GANs in fashion applications?

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Ends in question mark (2):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Cherel Suson

79776536

Date: 2025-09-27 05:12:44
Score: 2.5
Natty:
Report link

You have to use external filter.

1. Command -> External Filter (C-x !)

2. type your filter query (ie. ls <pattern>*)

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Low reputation (1):
Posted by: fidodido

79776523

Date: 2025-09-27 04:25:35
Score: 3
Natty:
Report link

Let's move to Setting>Features>Chat> and then click Chat> Command Center: Enabled. I'm sure that it will work

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Dat Dong Van

79776522

Date: 2025-09-27 04:16:33
Score: 1
Natty:
Report link

Another solution, with extra timeout features, redirect/no redirect.

Name                           Value
----                           -----
PSVersion                      7.5.3
PSEdition                      Core
GitCommitId                    7.5.3
OS                             Microsoft Windows 10.0.26100
Platform                       Win32NT
PSCompatibleVersions           {1.0, 2.0, 3.0, 4.0…}
PSRemotingProtocolVersion      2.3
SerializationVersion           1.1.0.1
WSManStackVersion              3.0

https://gist.github.com/YoraiLevi/d0d95011bed792dff57a301dbc2780ec

function Invoke-Process {
    <#
    .SYNOPSIS
    Starts a process with optional redirected stdout and stderr streams for better output handling.
    Allow to wait for the process to exit or forcefully kill it with timeout.
    
    .DESCRIPTION
    This function creates and starts a new process with optional standard output and error streams 
    redirected to enable capture and processing. It provides various waiting options
    including timeout and TimeSpan timeout support.
    
    .PARAMETER FilePath
    The path to the executable file to run.
    
    .PARAMETER ArgumentList
    Arguments to pass to the executable.
    
    .PARAMETER WorkingDirectory
    The working directory for the process.
    
    .PARAMETER Wait
    Wait for the process to exit without timeout.
    
    .PARAMETER Timeout
    Wait for the process to exit with a timeout in milliseconds.
    
    .PARAMETER TimeSpan
    Wait for the process to exit with a TimeSpan timeout.
    
    .PARAMETER TimeoutAction
    Action to take when wait operations timeout. Valid values are 'Continue', 'Inquire', 'SilentlyContinue', 'Stop'.
    
    .PARAMETER RedirectOutput
    Redirect stdout and stderr streams. When false, uses Start-Process for normal console output.
    It is Recommended to use the PassThru switch to access the redirected output through the returned process object
    You're welcome to think of a better solution to this.
    
    .PARAMETER PassThru
    Return the process object.
    
    .EXAMPLE
    # Basic usage without waiting - starts process and control returns immediately
    Invoke-Process -FilePath "ping.exe" -ArgumentList "google.com", "-n", "10"

     .EXAMPLE
    # Basic usage with timeout - starts process and control returns immediately, the process is killed after 3 seconds
    Invoke-Process -FilePath "ping.exe" -ArgumentList "google.com", "-n", "10" -Timeout 3
    
    .EXAMPLE
    # Wait for process to complete
    Invoke-Process -FilePath "ping.exe" -ArgumentList "google.com", "-n", "4" -Wait
    
    .EXAMPLE
    # Wait with timeout (3 seconds), after 3 seconds the process is killed
    Invoke-Process -FilePath "ping.exe" -ArgumentList "google.com", "-n", "10" -Wait -Timeout 3
    
    .EXAMPLE
    # Wait with TimeSpan timeout and custom timeout action, after 3 an inquire is shown asking what to do
    Invoke-Process -FilePath "ping.exe" -ArgumentList "google.com", "-n", "10" -Wait -TimeSpan (New-TimeSpan -Seconds 3) -TimeoutAction Inquire
    
    .EXAMPLE
    # Redirect output and get process object
    $process = Invoke-Process -FilePath "ping.exe" -ArgumentList "google.com", "-n", "10" -TimeSpan (New-TimeSpan -Seconds 3) -TimeoutAction Stop -RedirectOutput -PassThru
    $output = $process.StandardOutput.ReadToEnd()
    $errors = $process.StandardError.ReadToEnd()
   
    .LINK
    https://gist.github.com/YoraiLevi/d0d95011bed792dff57a301dbc2780ec
    .LINK
    https://stackoverflow.com/a/66700583/12603110
    .LINK
    https://stackoverflow.com/q/36933527/12603110
    .LINK
    https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/start-process?view=powershell-7.5#parameters
    .LINK
    https://github.com/PowerShell/PowerShell/blob/d8b1cc55332079d2be94cc266891c85e57d88c55/src/Microsoft.PowerShell.Commands.Management/commands/management/Process.cs#L1597
    #>
    [CmdletBinding(SupportsShouldProcess, DefaultParameterSetName = 'NoWait')]
    param
    (
        [Parameter(Mandatory, Position = 0)]
        [ValidateNotNullOrEmpty()]
        [Alias('PSPath', 'Path')]
        [string]$FilePath,
        [Parameter(Position = 1)]
        [string[]]$ArgumentList = @(),
        [ValidateNotNullOrEmpty()]
        [string]$WorkingDirectory,

        [Parameter(ParameterSetName = 'WithTimeout')]
        [Parameter(ParameterSetName = 'WithTimeSpan')]
        [Parameter(Mandatory, ParameterSetName = 'WaitExit')]
        [switch]$Wait,
        [Parameter(Mandatory, ParameterSetName = 'WithTimeout')]
        [int]$Timeout,
        [Parameter(Mandatory, ParameterSetName = 'WithTimeSpan')]
        [System.TimeSpan]$TimeSpan,
        [Parameter(ParameterSetName = 'WithTimeout')]
        [Parameter(ParameterSetName = 'WithTimeSpan')]
        [ValidateSet('Continue', 'Inquire', 'SilentlyContinue', 'Stop')]
        [string]$TimeoutAction = 'Stop',
        [switch]$RedirectOutput,
        [switch]$PassThru,
        # Consider adding support for the other Start-Process parameters and make this into a drop in replacement for Start-Process:
        # https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/start-process?view=powershell-7.5#parameters
        # partial eg:
        # [-Verb <string>]
        # [-WindowStyle <ProcessWindowStyle>]
        [hashtable]$Environment,
        [switch]$UseNewEnvironment
    )

    $ErrorActionPreference = 'Stop'

    $command = Get-Command $FilePath -CommandType Application -ErrorAction SilentlyContinue
    $resolvedFilePath = if ($command) {
        $command.Source
    }
    else {
        $FilePath
    }

    $argumentString = if ($ArgumentList -and $ArgumentList.Count -gt 0) {
        " " + ($ArgumentList -join " ")
    }
    else {
        ""
    }
    
    $target = "$resolvedFilePath$argumentString"
    
    if ($PSCmdlet.ShouldProcess($target, $MyInvocation.MyCommand)) {
        if (($TimeoutAction -eq 'Inquire') -and -not $Wait) {
            throw "TimeoutAction 'Inquire' and 'Wait' switch are not compatible"
        }

        class Process : System.Diagnostics.Process {
            [void] WaitForExit() {
                $this.StandardOutput.ReadToEnd()
                $this.StandardError.ReadToEnd()
                ([System.Diagnostics.Process]$this).WaitForExit()
            }
        }
        function InvokeTimeoutAction {
            param(
                [string]$TimeoutAction,
                [System.Diagnostics.Process]$Process
            )
            
            switch ($TimeoutAction) {
                'Continue' {
                    Write-Debug "Waiting action: Continue"
                    Write-Warning "Process may still be running. Continuing..."
                }
                'Inquire' {
                    Write-Debug "Waiting action: Inquire"
                    $choice = Read-Host "Process is still running. What would you like to do? (K)ill, (W)ait"
                    switch ($choice.ToLower()) {
                        'k' { 
                            if (!$Process.HasExited) {
                                $Process.Kill()
                            }
                        }
                        'w' {
                            $Process.WaitForExit()
                        }
                        default {
                            Write-Warning "Invalid choice. Process will continue running."
                        }
                    }
                }
                'SilentlyContinue' {
                    Write-Debug "Waiting action: SilentlyContinue"
                    # No action - let process continue running
                }
                'Stop' {
                    Write-Debug "Waiting action: Stop"
                    if (!$Process.HasExited) {
                        $Process.Kill()
                    }
                }
                default {
                    Write-Debug "Waiting action: Default, should never happen"
                    # Unreachable code
                    Write-Error "Invalid wait action: $WaitAction"
                }
            }
        }
        $script_block = { param($Id, $Timeout)
            $function:InvokeTimeoutAction = $using:function:InvokeTimeoutAction;
            $TimeoutAction = $using:TimeoutAction;
            Write-Host "TimeoutAction: $TimeoutAction, Id: $Id, Timeout: $Timeout"
            $p = Wait-Process -Id $Id -Timeout $Timeout -PassThru;
            if ($TimeoutAction) {
                InvokeTimeoutAction -TimeoutAction $TimeoutAction -Process $p 
            } 
        }
        $p = $null
        if ($RedirectOutput) {
            $pinfo = New-Object System.Diagnostics.ProcessStartInfo
            $pinfo.FileName = $FilePath
            $pinfo.RedirectStandardError = $true
            $pinfo.RedirectStandardOutput = $true
            $pinfo.UseShellExecute = $false
            $pinfo.WindowStyle = 'Hidden'
            $pinfo.CreateNoWindow = $true
            $pinfo.Arguments = $ArgumentList
            if ($WorkingDirectory) {
                $pinfo.WorkingDirectory = $WorkingDirectory
            }
            function LoadEnvironmentVariable {
                # https://github.com/PowerShell/PowerShell/blob/d8b1cc55332079d2be94cc266891c85e57d88c55/src/Microsoft.PowerShell.Commands.Management/commands/management/Process.cs#L2231C24-L2231C335
                param(
                    [System.Diagnostics.ProcessStartInfo]$ProcessStartInfo,
                    [System.Collections.IDictionary]$EnvironmentVariables
                )
                
                $processEnvironment = $ProcessStartInfo.EnvironmentVariables
                foreach ($entry in $EnvironmentVariables.GetEnumerator()) {
                    if ($processEnvironment.ContainsKey($entry.Key)) {
                        $processEnvironment.Remove($entry.Key)
                    }
                    
                    if ($null -ne $entry.Value) {
                        if ($entry.Key -eq "PATH") {
                            if ($IsWindows) {
                                $machinePath = [System.Environment]::GetEnvironmentVariable($entry.Key, [System.EnvironmentVariableTarget]::Machine)
                                $userPath = [System.Environment]::GetEnvironmentVariable($entry.Key, [System.EnvironmentVariableTarget]::User)
                                $combinedPath = $entry.Value + [System.IO.Path]::PathSeparator + $machinePath + [System.IO.Path]::PathSeparator + $userPath
                                $processEnvironment.Add($entry.Key, $combinedPath)
                            }
                            else {
                                $processEnvironment.Add($entry.Key, $entry.Value)
                            }
                        }
                        else {
                            $processEnvironment.Add($entry.Key, $entry.Value)
                        }
                    }
                }
            }
            # https://github.com/PowerShell/PowerShell/blob/d8b1cc55332079d2be94cc266891c85e57d88c55/src/Microsoft.PowerShell.Commands.Management/commands/management/Process.cs#L1954
            if ($UseNewEnvironment) {
                $pinfo.EnvironmentVariables.Clear()
                LoadEnvironmentVariable -ProcessStartInfo $pinfo -EnvironmentVariables ([System.Environment]::GetEnvironmentVariables([System.EnvironmentVariableTarget]::Machine))
                LoadEnvironmentVariable -ProcessStartInfo $pinfo -EnvironmentVariables ([System.Environment]::GetEnvironmentVariables([System.EnvironmentVariableTarget]::User))
            }

            if ($Environment) {
                LoadEnvironmentVariable -ProcessStartInfo $pinfo -EnvironmentVariables $Environment
            }
            $p = New-Object Process
            $p.StartInfo = $pinfo
            $p.Start() | Out-Null
        }
        else {
            $startProcessParams = @{
                FilePath     = $FilePath
                ArgumentList = $ArgumentList
                PassThru     = $true
                NoNewWindow  = $true
            }
            if ($WorkingDirectory) {
                $startProcessParams.WorkingDirectory = $WorkingDirectory
            }
            if ($Environment) {
                $startProcessParams.Environment = $Environment
            }
            if ($UseNewEnvironment) {
                $startProcessParams.UseNewEnvironment = $UseNewEnvironment
            }
            $p = Start-Process @startProcessParams -Confirm:$false
        }
        Write-Debug "Process started: $target"
        Write-Debug "Waiting Mode: $($PSCmdlet.ParameterSetName)"

        if ($Wait) {
            switch ($PSCmdlet.ParameterSetName) {
                'WaitExit' {
                    Write-Debug "Waiting for process to exit..."
                    $p.WaitForExit() | Out-Null
                }
                'WithTimeout' {
                    Write-Debug "Waiting for process to exit with timeout..."
                    $p.WaitForExit($Timeout * 1000) | Out-Null
                    InvokeTimeoutAction -TimeoutAction $TimeoutAction -Process $p
                }
                'WithTimeSpan' {
                    Write-Debug "Waiting for process to exit with timespan..."
                    $p.WaitForExit($TimeSpan) | Out-Null
                    InvokeTimeoutAction -TimeoutAction $TimeoutAction -Process $p
                }
                default {
                    Write-Error "Invalid parameter set: $($PSCmdlet.ParameterSetName)"
                }
            }
        }
        else {
            switch ($PSCmdlet.ParameterSetName) {
                'WithTimeout' {
                    Start-Job -ScriptBlock $script_block -ArgumentList $p.Id, $Timeout | Out-Null
                    Write-Debug "Letting process run in background with timeout..."
                }
                'WithTimeSpan' {
                    Start-Job -ScriptBlock $script_block -ArgumentList $p.Id, $TimeSpan.TotalSeconds | Out-Null
                    Write-Debug "Letting process run in background with timespan..."
                }
                'NoWait' {
                    Write-Debug "Letting process run in background..."
                }
                default {
                    Write-Error "Invalid parameter set: $($PSCmdlet.ParameterSetName)"
                }
            }
        }
    
        if ($PassThru) {
            Write-Debug "Returning process object"
            return $p
        }
    }
}

Reasons:
  • Blacklisted phrase (1): stackoverflow
  • Probably link only (1):
  • Long answer (-1):
  • Has code block (-0.5):
  • Low reputation (0.5):
Posted by: Yorai Levi

79776515

Date: 2025-09-27 04:12:32
Score: 1
Natty:
Report link

Turns out the property element wasn't actually necessary. At some point I thought that maybe I can submit the app without it and give the reason for the permission in some submittal form. It makes sense, if you think about it, what if I need to modify my explanation to correct or clarify something ? If it's in the manifest, I would need to rebuild the app and theoretically test it again completely. Which is nonsense.
Bottom line, it worked, and the app was even approved.

So I'm guessing the document I quoted initially, and a few more on the subject, are probably obsolete. I mentioned this in my bug report case at Google and asked them to check, if they can, no response so far.

In any case looks to me like this is clearly the best way to do it. As long as it stays like this.

Reasons:
  • Blacklisted phrase (0.5): I need
  • Whitelisted phrase (-1): it worked
  • Long answer (-0.5):
  • No code block (0.5):
  • Contains question mark (0.5):
  • Self-answer (0.5):
  • Low reputation (0.5):
Posted by: VSim

79776506

Date: 2025-09-27 03:31:23
Score: 2.5
Natty:
Report link

Flask templates and staticc paths declared when instantiate app object are relative to project path (also xeclared when instantiate app). So I recommend to clearly declare the project path to be aware of it. By default Flaak consider the project path derived from __name__ when instantiate as =Fkask(_name_)

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Petre Iordanescu

79776503

Date: 2025-09-27 03:21:21
Score: 2
Natty:
Report link

This happens in all save dialogues, what erks me the most is the three clicks needed when the file name is selected & you click somewhere in the name to edit it, instead of one click & the curser appears where you click, it only clears some characters but leave a group still selected, sometime 3 clicks before the curser is there blinking where you clicked with no other characters selected, if I could get a Linux Distro to do all I need to do I'd have bailed on MS already, have not given up, NOT migrating to Win11 EVER ... over the crapiness & the spying!

Reasons:
  • Blacklisted phrase (0.5): I need
  • Long answer (-0.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: John Moore

79776501

Date: 2025-09-27 03:08:18
Score: 3
Natty:
Report link

I myself learning SQL now and yeah Using JOIN syntax and as makes life easier for non coders

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Madhu

79776487

Date: 2025-09-27 02:02:06
Score: 1
Natty:
Report link

On-chain data refers to all the information that is recorded directly on a blockchain network. This includes details about wallet balances, transaction history, smart contract interactions, validator activities, token transfers, and much more. But where exactly does this data originate, and how is it accessed?

The Source of On-Chain Data

Every public blockchain—like Bitcoin, Ethereum, Cardano, and others—maintains a decentralized ledger. This ledger is composed of blocks that contain grouped transactions. As blockchain nodes validate these transactions and add them to the blockchain, the data becomes immutable and publicly viewable.

This data is generated in real time by users interacting with the blockchain through wallets or dApps, and by block producers (miners or validators) who bundle and confirm transactions.

How Is On-Chain Data Accessed?

There are several ways to access this data:

  1. Node APIs: Running a full node on a blockchain gives you direct access to the ledger's data. For example, Ethereum nodes expose an RPC interface that allows developers to query everything from block headers to transaction receipts.

  2. Blockchain Explorers: Websites like Etherscan or Blockchain.com provide a human-readable way to browse on-chain data. They pull data directly from nodes and present it via intuitive UI.

  3. Third-Party APIs and Analytics Platforms: Services like Glassnode, Nansen, Dune Analytics, and CoinMetrics offer enriched on-chain data analytics. These platforms aggregate raw blockchain data, structuring it for easier analysis and integrating off-chain signals.

  4. Indexing Services: Some solutions, like The Graph, allow developers to build and query subgraphs, essentially custom databases of blockchain data, using a GraphQL interface.

Understanding and analyzing on-chain data is crucial for evaluating market sentiment, network health, and smart contract performance. It's especially valuable for investors, developers, and analysts who want to track metrics like active address count, total value locked (TVL), or transaction volume.

If you're particularly interested in Ethereum, one relevant trend is the growing institutional interest highlighted by ETF flows and staking data. These indicators can be derived and verified via on-chain sources as well.

For more insights on Ethereum's on-chain activity and its implications, check out this related article: Staked Ethereum Hits Record High as ETH Price Tops $2700.

Reasons:
  • Long answer (-1):
  • No code block (0.5):
  • Contains question mark (0.5):
  • Low reputation (1):
Posted by: Spearmint

79776481

Date: 2025-09-27 01:30:59
Score: 2.5
Natty:
Report link

Try reaching out to [email protected] they may provide some solutions.

I used there free obj to 3d tiles converter

https://app.d3d.ai/free/converter/objto3dtile

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Prudhvi Rajzz

79776470

Date: 2025-09-27 01:02:54
Score: 3
Natty:
Report link

Mirroring for Azure SQL database in Fabric is currently in GA and you should be able to use it in production

https://techcommunity.microsoft.com/blog/azuresqlblog/announcing-the-general-availability-ga-of-mirroring-for-azure-sql-database-in-mi/4303936

Reasons:
  • Probably link only (1):
  • Low length (1):
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: Anagha

79776468

Date: 2025-09-27 00:59:53
Score: 3.5
Natty:
Report link

Tracks released before 1940 has no ISRC.

Reasons:
  • Low length (1.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Niki Ladau

79776462

Date: 2025-09-27 00:05:42
Score: 0.5
Natty:
Report link

much shorter:

getWidth = function () {  
    return self.innerWidth ? self.innerWidth :  
            document.documentElement && document.documentElement.clientHeight ? document.documentElement.clientWidth :  
            document.body ? document.body.clientWidth : 0;  
};
Reasons:
  • Low length (0.5):
  • Has code block (-0.5):
  • Low reputation (0.5):
Posted by: Stefanidis

79776450

Date: 2025-09-26 23:28:33
Score: 1
Natty:
Report link
import okhttp3.*;
import javax.net.SocketFactory;

import fucksocks.client.Socks5;
import fucksocks.client.SocksProxy;
import fucksocks.client.SocksSocket;

import java.net.*;
import java.io.IOException;

public class MinimalErrorReproduction {
    
    static class SocksLibSocketFactory extends SocketFactory {
        private final SocksProxy socksProxy;
        
        public SocksLibSocketFactory(String proxyHost, int proxyPort, String username, String password) {
            // Use the constructor that accepts username/password directly
            this.socksProxy = new Socks5(new InetSocketAddress(proxyHost, proxyPort), username, password);
        }
        
        @Override
        public Socket createSocket() throws IOException {
            return new Socket();
        }
        
        @Override
        public Socket createSocket(String host, int port) throws IOException {
            return new SocksSocket(socksProxy, new InetSocketAddress(host, port));
        }
        
        @Override
        public Socket createSocket(InetAddress host, int port) throws IOException {
            return new SocksSocket(socksProxy, new InetSocketAddress(host, port));
        }
        
        @Override
        public Socket createSocket(String host, int port, InetAddress localHost, int localPort) throws IOException {
            Socket socket = createSocket(host, port);
            socket.bind(new InetSocketAddress(localHost, localPort));
            return socket;
        }
        
        @Override
        public Socket createSocket(InetAddress address, int port, InetAddress localAddress, int localPort) throws IOException {
            return createSocket(address.getHostAddress(), port, localAddress, localPort);
        }
    }
    
    public static void main(String[] args) {
        try {
            String proxyHost = "proxy.soax.com";
            int proxyPort = 5000;
            String proxyUsername = Settings.PROXY_USERNAME;
            String proxyPassword = Settings.PROXY_PASSWORD;

            OkHttpClient client = new OkHttpClient.Builder()
                .socketFactory(new SocksLibSocketFactory(proxyHost, proxyPort, proxyUsername, proxyPassword))
                .build();

            Request request = new Request.Builder()
                .url("https://httpbin.org/ip")
                .build();

            Response response = client.newCall(request).execute();
            System.out.println("Response code: " + response.code());
            System.out.println("Response body: " + response.body().string());
            response.close();

        } catch (IOException e) {
            System.err.println("ERROR: " + e.getMessage());
            e.printStackTrace();
        }
    }
}

Figured it out!

Reasons:
  • Blacklisted phrase (2): fuck
  • Long answer (-1):
  • Has code block (-0.5):
  • Low reputation (0.5):
Posted by: Jacob