Skip to main content

gnome桌面便笺 | best sticky note application

最近需要搞个桌面上的todo list, 以前是用screenlets,现在不用了,而且为一个插件就开这个庞然大物太浪费了。

我在用gnote,但是这个不适合放在桌面上。gnome-panel的一个小插件也是sticky note,但是不能锁定在桌面上,一点就消失了。

另外搜到的xpad,但是我这里有bug,一个灰色的窗口,什么都么有。网上搜到了解决的patch,但是不想折腾了。

最后看到某人论坛留言: 在桌面建一个文本文件,然后把图标放大。。。顿时豁然开朗,一开始遇到这个特性时还觉得有些烦人,但是现在需要时反而想不起来了。。。

效果不错,缺点是不能弄太多文字。


Recently I found that I need a sticky note on my desktop. I used screenlets before, but not anymore now. It's a waste to enable it only for such a gadget.

Now I'm using gnote, which is rather a nice software, but it's not suitable for 'sticky' notes. There's also a stickynote applet for gnome-panel, but I don't know how to attach the notes to desktop -- every time I click somewhere, the notes disappear.

I googled some software called 'xpad', but on my computer it's nothing but a gray empty window -- an annoying bug, although I've googled a patch for this, I've got no feeling for it.

Finally I got someone's comment on some bbs -- "create a paint text file on the desktop, and then stretch the icon large enough..." -- that's it! It was quite an annoying feature to me at the first time, but now I cannot even remember it when I do need it now...

This trick works well, except for that there cannot be too many words.

Comments

Popular posts from this blog

Determine Perspective Lines With Off-page Vanishing Point

In perspective drawing, a vanishing point represents a group of parallel lines, in other words, a direction. For any point on the paper, if we want a line towards the same direction (in the 3d space), we simply draw a line through it and the vanishing point. But sometimes the vanishing point is too far away, such that it is outside the paper/canvas. In this example, we have a point P and two perspective lines L1 and L2. The vanishing point VP is naturally the intersection of L1 and L2. The task is to draw a line through P and VP, without having VP on the paper. I am aware of a few traditional solutions: 1. Use extra pieces of paper such that we can extend L1 and L2 until we see VP. 2. Draw everything in a smaller scale, such that we can see both P and VP on the paper. Draw the line and scale everything back. 3. Draw a perspective grid using the Brewer Method. #1 and #2 might be quite practical. #3 may not guarantee a solution, unless we can measure distances/p...

Hardware Password Manager

[Updates 2025-01-20] The original blog post assumes that all passwords are stored in one password manager, and the password manager either unlocks everything or nothing (e.g. Keepass). After discussing with friends, I realized that if I use something like pass , and I use a hardware GPG token, I can actually store and sync all encrypted passwords to all devices, because I will only decrypt the passwords on demand, and the computer will not see the GPG private key. The compromise is that the computer will see the list of all password entries (e.g. accounts), as well as a few other issues . I've been using Keepass for many years. I don't use online password services because I cannot fully trust them. Besides, I may not always have Internet connection, which is why I also don't use a self-hosted service. Everything has been working fine, until I turn my paranoid knob to the max. Here's the thought experiment . The Imaginary Scenario Let's say I have 100 PCs for differe...

ESP32S3: Flash Encryption and Secure Boot

Flash encryption and secure boot are useful security features for ESP32S3 chip. While not perfect, they definitely make it harder to extract the secrets in the chip. However, it is tricky to enable both features at the same time. The topic is actually discussed in the official documentation: ESP32S3 Security Features Security Features Enablement Workflows Especially, the second one mentioned it is recommended to enable flash encryption before secure boot. But I still find the documentation confusing. In the end I was able to successfully enable both, here's my findings. My Understanding After my adventure, here's what I think could have worked. WARNING, this is untested. Follow  Security Features Enablement Workflows : Burn all the keys, as long as their purpose eFuses and read/write protections Burn other security eFuses, but DO NOT burn ENABLE_SECURITY_DOWNLOAD in the middle, which is mentined at the end of the instruction for both flash encryption and secure boot. Burn...