You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Installing Nix without root is possible by using nix-user-chroot, which creates a user-space chroot and maps a writable directory to /nix. This allows Nix to work in environments where you cannot create or write to the real /nix path.
Working on a system without root privilege is challenging when you need to install utilities. Homebrew is a popular rootless package manager widely used on macOS and Linux. However, installing Homebrew typically requires temporary root access to write to /home/linuxbrew.
While you can install to any other writable directory, this approach is unsupported and prevents access to pre-built binaries ("bottles")—meaning almost everything must be compiled from source, which is slow and tedious. This guide provides a workaround using PRoot to "fake" a writable /home/linuxbrew directory for your user, allowing Homebrew to function seamlessly without root access.
Locate URL to the binary in Build > Jobs > Stage=dist, for example: https://gitlab.com/proot/proot/-/jobs/2370229665/artifacts/download?file_type=archive
AutoHotKey example: hotkey activated loop, skip if window not in focus.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Avoid QoS error when submitting large number of slurm tasks. The script dispatch new task when previous one is completed.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Update timestamps (touch) for files under specified directory.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Disable kernel message output on /dev/ttyS0 once user logged in. Handy if you have to work over TTY. Put this under /etc/profile.d/
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This script enables you to forward all traffic from a Tailscale exit node through a WireGuard tunnel.
Most mobile devices support only one active VPN connection at a time. As a result, users can't simultaneously use Tailscale for connectivity and route their internet traffic through another VPN.
This script provides a workaround by turning a Tailscale exit node into a VPN bridge. When clients use this special exit node, their internet traffic is protected by the VPN while still maintaining Tailscale connectivity.
Requirements:
Enable forwarding
Tailscale need to run with --netfilter-mode=[off|nodivert] for manual routing control
Set Table = off in Wireguard config to manual control ip rules
Get Dominion Energy hourly usage data, then save to SQLite. Login with Selenium+Chrome
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters