logo
 
  1. Betriebssysteme >
  2. Linux Tipps >
  3. CLIs for image browsing?


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

CLIs for image browsing?


Linux Tipps vom | Direktlink: reddit.com Nachrichten Bewertung

Hi, everyone. Terminal users:

Does anyone have a solution to searching through images? I'm talking about image-to-text engines (if that's what they're called). That would be more suited to images with text.

Memes, document/ticket scans, etc. Do such engines exist, and are they available? Is there a way to search for an image by a string of text you remember that's in the image?

And what about generic photos where there is hardly any text? Do terminal users use some kind of tagging software? When the default IMG-20201230.jpg type filenames and directories just aren't enough, what do you do?

Sorting my months or trips is good, but then if you wanted to tag some images from multiple directories, how do you do it? When the file system isn't enough...

This is one of the times I'm jealous of my phone's GUI.

submitted by /u/torresjrjr
[link] [comments]...

https://www.reddit.com/r/linux/comments/epo1wg/clis_for_image_browsing/

Externe Webseite mit kompletten Inhalt öffnen

➤ Ähnliche Beiträge von Team IT Security

  • 1.

    Diving Deep Into a Pwn2Own Winning WebKit Bug

    vom 813.91 Punkte ic_school_black_18dp
    Pwn2Own Tokyo just completed, and it got me thinking about a WebKit bug used by the team of Fluoroacetate (Amat Cama and Richard Zhu) at this year’s Pwn2Own in Vancouver. It was a part of the chain that earned them $55,000 and was a nifty piece of
  • 2.

    MindShaRE: Hardware Reversing with the TP-Link TL-WR841N Router

    vom 406.95 Punkte ic_school_black_18dp
    In early 2019, we received a bug submission from a new researcher affecting the TP-Link TL-WR841N Router. While this vulnerability is still in disclosure phase, we would like to share lessons learned when we were vetting this submission. TL-WR841N
  • 3.

    USN-4041-1: Linux kernel update

    vom 347.61 Punkte ic_school_black_18dp
    linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon update A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.04 Ubuntu 18.10 Ubun
  • 4.

    MindShaRE: Hardware Reversing with the Belkin Surf N300 Router

    vom 325 Punkte ic_school_black_18dp
    In late 2018, the ZDI received a collection of submissions affecting a version of SuperTask! RTOS that runs on a collection of devices. These bug reports were submitted by two new researchers to the program: Josep Pi Rodriguez and Pedro Guilln Nuez. One o
  • 5.

    DirectX to the Kernel

    vom 322.17 Punkte ic_school_black_18dp
    The operating system kernel is the final goal for every great exploit chain. You can look at the entries in the Zero Day Initiative (ZDI) Pwn2Own contests over the years to see that process at work. The Windows kernel has been subject to many points of
  • 6.

    Local Privilege Escalation in Win32k.sys Through Indexed Color Palettes

    vom 322.17 Punkte ic_school_black_18dp
    This is the second in our series of Top 5 interesting cases from 2019. Each of these bugs has some element that sets them apart from the more than 1,000 advisories released by the program this year. Today’s blog looks a local privilege escalation in t
  • 7.

    USN-4017-1: Linux kernel vulnerabilities

    vom 310.87 Punkte ic_school_black_18dp
    linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.04 Ubuntu 18.10 Ubun
  • 8.

    USN-4135-1: Linux kernel vulnerabilities

    vom 282.61 Punkte ic_school_black_18dp
    linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-gke-5.0, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities A security issue affects these releases of Ubuntu and its derivatives
  • 9.

    An Insincere Form of Flattery: Impersonating Users on Microsoft Exchange

    vom 271.3 Punkte ic_school_black_18dp
    This is the third in our series of Top 5 interesting cases from 2018. Each of these bugs has some element that sets them apart from the approximately 1,400 advisories released by the program this year. Today we look at an Exchange bug that allows any au
  • 10.

    Implementing Fuzz Logics with Dharma

    vom 254.35 Punkte ic_school_black_18dp
    Hello everyone. My name is Mat and I am a fuzzing addict. I can’t stop.  I’m constantly doing it and craving that next fix. I need it.  I’m addicted to the thrill ­of the hunt -- the anxiety and anticipation for my fuzzers to report a crashin
  • 11.

    Onix: Finding Pokémon in your Acrobat (Revealing a new attack surface)

    vom 240.22 Punkte ic_school_black_18dp
    Finding new targets to audit is always fun. At the same time, it can be a challenging task –especially if we’re going to start auditing the target from scratch. It can also be quite tedious and time consuming. While going through the ups and downs of
  • 12.

    Reliably Finding and Exploiting ICS/SCADA Bugs

    vom 220.43 Punkte ic_school_black_18dp
    Full disclosure: I love SCADA software. I love the endless teaching opportunities available with a simple install. Looking for your first stack-based buffer overflow? Try SCADA. SQL Injection? Try SCADA! Ready to go directly to NT AUTHORITY/SYSTEM from an unp

Kommentare ber CLIs for image browsing?