Skip to content

Instantly share code, notes, and snippets.

@chrisswanda
chrisswanda / WireGuard_Setup.txt
Last active June 30, 2025 19:15
Stupid simple setting up WireGuard - Server and multiple peers
Install WireGuard via whatever package manager you use. For me, I use apt.
$ sudo add-apt-repository ppa:wireguard/wireguard
$ sudo apt-get update
$ sudo apt-get install wireguard
MacOS
$ brew install wireguard-tools
Generate key your key pairs. The key pairs are just that, key pairs. They can be
@georgepaoli
georgepaoli / nginx-lua-get-token-body-json.conf
Created May 11, 2020 19:27
Get json field in body request using Lua in NGINX
server {
listen 80;
server_name localhost;
location / {
default_type application/json;
access_by_lua_block {
ngx.req.read_body()
local cjson = require "cjson"
local body = cjson.decode(ngx.req.get_body_data())
# If Debian 11 is ran on a LXC container (Proxmox), SSH login and sudo actions can be slow
# Check if in /var/log/auth.log the following messages
Failed to activate service 'org.freedesktop.login1': timed out (service_start_timeout=25000ms)
-> Run systemctl mask systemd-logind
-> Run pam-auth-update (and deselect Register user sessions in the systemd control group hierarchy)
@enjikaka
enjikaka / instructions.md
Last active June 19, 2025 11:16
Installing Proxmox on Raspberry Pi 4 and 5 (Pimox)

Installing Proxmox on Raspberry Pi 4 and 5

With these steps I managed to get Pimox on my Raspberry Pi 4 and 5 in february 2024.

Step 1 - Flashing the OS

Install "RPi OS Lite 64-bit" with Raspberry Pi Imager. It's listed under "Raspberry Pi OS (Other)"

@AnnoyingTechnology
AnnoyingTechnology / code-deontologie-infomatique.txt
Last active April 18, 2025 14:50
Code de déontologie informatique (transposition du code de déontologie médicale à l'informatique)
DEVOIRS GÉNÉRAUX DES INFORMATICIENS
ARTICLE R.4127-2 (transposé)
L'informaticien, au service de l’individu et de la sécurité numérique, exerce sa mission dans le respect de la vie privée, de la personne et de sa dignité numérique. Le respect dû à la personne ne cesse pas de s’imposer après la suppression de ses données.
ARTICLE R.4127-3 (transposé)
L'informaticien doit, en toutes circonstances, respecter les principes de moralité, de probité et de dévouement indispensables à l’exercice de l'informatique.