Create a template service file at /etc/systemd/system/[email protected]. The template parameter will correspond to the name
of target host:
[Unit]
Description=Setup a secure tunnel to %I
After=network.target| Largest 1000 Cities in America | |
| 2013 popuation data - Biggest US Cities By Population | |
| rank,city,state,population,2000-2013 growth | |
| 1,New York,New York,8405837,4.8% | |
| 2,Los Angeles,California,3884307,4.8% | |
| 3,Chicago,Illinois,2718782,-6.1% | |
| 4,Houston,Texas,2195914,11.0% | |
| 5,Philadelphia,Pennsylvania,1553165,2.6% |
| 1) First you need to generate download token. Login to your account on magento.com and generate it in Account Settings->Downloads Access Token | |
| 2) You will need your MAGEID as well. It is shown at the top-left in your account page. | |
| 3) curl -k https://MAGEID:[email protected]/products/downloads/info/help | |
| 4) Profit! |
Create a template service file at /etc/systemd/system/[email protected]. The template parameter will correspond to the name
of target host:
[Unit]
Description=Setup a secure tunnel to %I
After=network.target(Inspired by https://medium.com/@icanhazedit/clean-up-unused-github-rpositories-c2549294ee45#.3hwv4nxv5)
Open in a new tab all to-be-deleted github repositores (Use the mouse’s middle click or Ctrl + Click) https://github.com/username?tab=repositories
Use one tab https://chrome.google.com/webstore/detail/onetab/chphlpgkkbolifaimnlloiipkdnihall to shorten them to a list.
Save that list to some path
The list should be in the form of “ur_username\repo_name” per line. Use regex search (Sublime text could help). Search for ' |.*' and replace by empty.
Sites which may involve the transmission of very sensitive data, such as health or banking information, are marked with an ❗ to signal they should deploy HTTPS-by-default as soon as possible. If you are a popular website (such as those on the Alexa Top 500 Global Sites) which finds itself on this list - and you want to be removed - you can visit Let's Encrypt about transitioning to HTTPS. It's easy, free, and will help you learn how to protect your customers/ readers!
List now outdated, removed until further notice.
Q: What is HTTPS?
| #!/bin/bash | |
| # Author: http://crunchbang.org/forums/viewtopic.php?id=38748#p414992 | |
| # m4bronto | |
| # Chapter #0:0: start 0.000000, end 1290.013333 | |
| # first _ _ start _ end | |
| while [ $# -gt 0 ]; do | |
| ffmpeg -i "$1" 2> tmp.txt |
| 'use strict'; | |
| | |
| module.exports = function(app) { | |
| return function(req, res, next) { | |
| app.service('things').Model.aggregate([{ | |
| $match: {} | |
| }, { | |
| $project: { | |
| year: { | |
| $year: '$createdAt' |
| [Unit] | |
| Description=Job that runs the python SimpleHTTPServer daemon | |
| Documentation=man:SimpleHTTPServer(1) | |
| [Service] | |
| Type=simple | |
| WorkingDirectory=/tmp/letsencrypt | |
| ExecStart=/usr/bin/python -m SimpleHTTPServer 80 & | |
| ExecStop=/bin/kill `/bin/ps aux | /bin/grep SimpleHTTPServer | /bin/grep -v grep | /usr/bin/awk '{ print $2 }'` |
Creates an alias on the loopback interface (lo0) with the IP 127.0.0.2 on macOS.
/Library/LaunchDaemons/com.runlevel1.lo0.127.0.0.2.plistsudo chmod 0644 /Library/LaunchDaemons/com.runlevel1.lo0.127.0.0.2.plistsudo chown root:wheel /Library/LaunchDaemons/com.runlevel1.lo0.127.0.0.2.plistsudo launchctl load /Library/LaunchDaemons/com.runlevel1.lo0.127.0.0.2.plist| const readline = require('readline') | |
| const blank = '\n'.repeat(process.stdout.rows) | |
| console.log(blank) | |
| readline.cursorTo(process.stdout, 0, 0) | |
| readline.clearScreenDown(process.stdout) |