The easiest way to get the ClamAV package is using Homebrew
$ brew install clamav
Before trying to start the clamd
process, you'll need a copy of the ClamAV databases.
Create a freshclam.conf
file and configure as so
The easiest way to get the ClamAV package is using Homebrew
$ brew install clamav
Before trying to start the clamd
process, you'll need a copy of the ClamAV databases.
Create a freshclam.conf
file and configure as so
MAC M1 or similar clamav installation process
If like me you had to install clamav and clamd on a macbook with M1 processor, this might be helpful.
brew install clamav
cd /usr/local/etc/clamav/
cp freshclam.conf.sample freshclam.conf
Installation steps for running Arch Linux with root on ZFS using UEFI and systemd-boot
. All steps are run as root
.
Requires an Arch Linux image with ZFS built-in (see References).
If using KVM, add a Serial number for each virtual disk and reboot the VM. The disks should now be available in /dev/disk/by-id
as virtio-<Serial>
.
webRequestBlocking
API, which is neccesary for (effective) adblockers to workExtensionManifestV2Availability
key was added and will presumably stay forever after enterprises complain enoughYou can use this as a regular user, which will let you keep your mv2 extensions even after they're supposed to stop working
In a terminal, run:
# You don't need Fog in Ruby or some other library to upload to S3 -- shell works perfectly fine | |
# This is how I upload my new Sol Trader builds (http://soltrader.net) | |
# Based on a modified script from here: http://tmont.com/blargh/2014/1/uploading-to-s3-in-bash | |
S3KEY="my aws key" | |
S3SECRET="my aws secret" # pass these in | |
function putS3 | |
{ | |
path=$1 |
[repositories] | |
local | |
jcenter: https://jcenter.bintray.com/ | |
maven-central | |
typesafe-ivy-releases: https://repo.typesafe.com/typesafe/ivy-releases/, [organization]/[module]/[revision]/[type]s/[artifact](-[classifier]).[ext], bootOnly | |
sbt-ivy-snapshots: https://repo.scala-sbt.org/scalasbt/ivy-snapshots/, [organization]/[module]/[revision]/[type]s/[artifact](-[classifier]).[ext], bootOnly |
Setup etcdctl using the instructions at https://github.com/etcd-io/etcd/releases/tag/v3.4.13 (changed path to /usr/local/bin
):
Note: if you want to match th etcdctl binaries with the embedded k3s etcd version, please run the curl command for getting the version first and adjust ETCD_VER
below accordingly:
curl -L --cacert /var/lib/rancher/k3s/server/tls/etcd/server-ca.crt --cert /var/lib/rancher/k3s/server/tls/etcd/server-client.crt --key /var/lib/rancher/k3s/server/tls/etcd/server-client.key https://127.0.0.1:2379/version
#!/bin/bash | |
fdisk -lu | |
pvscan | |
vgscan | |
vgchange -a y | |
lvscan | |
mount /dev/ubuntu-vg/root /mnt | |
mount --bind /dev /mnt/dev | |
mount --bind /proc /mnt/proc |