Run osxForHackers.sh
System Preferences
- General
- Highlight color: Graphite
- Recent items: 50
- Mission Control
- All Hot Croners: Shift + Desktop
- Security & Privacy
- Turn on FileVault
10061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040 | |
{ "category_id": "13005047", "group": "place", "hierarchy": [ "Food and Drink", "Restaurants", "Cafe" ] }, { "category_id": "13005048", "group": "place", "hierarchy": [ "Food and Drink", "Restaurants", "Burrito" ] }, { "category_id": "13005049", "group": "place", "hierarchy": [ "Food and Drink", "Restaurants", "Burgers" ] }, { "category_id": "13005050", "group": "place", "hierarchy": [ "Food and Drink", "Restaurants", "Breakfast Spot" ] | |
"hierarchy": [ | |
server { | |
# The listen directive serves content based on the port defined | |
listen 80; # For IPv4 addresses | |
listen [::]:80; # For IPv6 addresses | |
# Replace the below if you have a domain name pointed to the server | |
server_name your-domain.com; | |
access_log /var/log/nginx/reverse-access.log; | |
error_log /var/log/nginx/reverse-error.log; |
<template> | |
<div> | |
<div ref="canvas" id="container"></div> | |
</div> | |
</template> | |
<script> | |
import * as THREE from "three"; | |
import { OBJLoader } from "three/examples/jsm/loaders/OBJLoader"; | |
var camera, | |
scene, |
# Check disk space before | |
df -h | |
# Delete local-lvm storage in gui | |
lvremove /dev/pve/data | |
lvresize -l +100%FREE /dev/pve/root | |
resize2fs /dev/mapper/pve-root |
sudo tee /etc/apt/sources.list.d/pritunl.list << EOF | |
deb https://repo.pritunl.com/stable/apt focal main | |
EOF | |
sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com --recv 7568D9BB55FF9E5287D586017AE645C0CF8E292A | |
sudo apt-get update | |
sudo apt-get install pritunl-client-electron |
#pfSense as an OpenVPN client for specific devices
##Introduction One of the most powerful features of pfSense is it’s ability to direct your data requests through different end-points using NAT rules. pfSense is amazing as an OpenVPN client because it can selectively route any device on the network through the VPN service (i.e., my tablets and TV go through US servers, while my smartphone, VoIP, computers go my local ISP).
This setup becomes extremely handy for use with applications which are not aware of OpenVPN protocol, eg. download managers, torrent clients, etc. Expecting privacy you should be positive that traffic won't go through your ISP's gateway in case of failure on side of VPN provider. And obviously OpenVPN client should automatically reconnect as soon as service goes live again.
Note: This How-To is meant for pfSense 2.1.x. For those using 2.2 Beta, there is a bug that prevents this from working. Read about here in the pfSense forum thread, “[cannot NAT trough OPT1 interface on multiw
A Pen by Casper Fabricius on CodePen.