I hereby claim:
- I am supermathie on github.
- I am supermathie (https://keybase.io/supermathie) on keybase.
- I have a public key whose fingerprint is B753 BD6B 2F90 7540 0F48 0008 6C07 FB30 07CF 9360
To claim this, I am signing this object:
| ipc_mode: tcp | |
| master: orchestrator.netdirect.ca | |
| root_dir: c:\salt | |
| pki_dir: /conf/pki/minion | |
| id: win7-salt | |
| multiprocessing: False |
| #!/usr/bin/env python | |
| import csv | |
| import sys | |
| from pprint import pprint | |
| csvreader = csv.reader(sys.stdin) | |
| # Read the header line and extract the column names | |
| header = csvreader.next() |
| #!/usr/bin/env python2 | |
| """ | |
| Author: takeshix <[email protected]> | |
| PoC code for CVE-2014-0160. Original PoC by Jared Stafford ([email protected]). | |
| Supportes all versions of TLS and has STARTTLS support for SMTP,POP3,IMAP,FTP and XMPP. | |
| """ | |
| import sys,struct,socket | |
| from argparse import ArgumentParser |
| #!/bin/bash -e | |
| # This script adds a 512MB swapfile to the system | |
| function get_new_swapfile() { | |
| for i in `seq 0 99`; do | |
| if [ ! -e /swapfile.$i ]; then | |
| echo /swapfile.$i | |
| return | |
| fi |
| ○ → host -a updates.mailfoundry.net 208.67.220.222 | |
| updates.mailfoundry.net. 1245 IN A 66.18.18.59 | |
| ○ → host -a updates.mailfoundry.net 208.67.220.220 | |
| updates.mailfoundry.net. 402 IN A 66.18.18.59 | |
| updates.mailfoundry.net. 0 IN AAAA ::ffff:67.215.65.132 |
I hereby claim:
To claim this, I am signing this object:
| @@ -1,48 +1,49 @@ | |
| -ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(128) Mac=AEAD | |
| -ECDHE-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(128) Mac=AEAD | |
| ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD | |
| ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD | |
| -DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD | |
| -DHE-DSS-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=DSS Enc=AESGCM(128) Mac=AEAD | |
| -DHE-DSS-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=DSS Enc=AESGCM(256) Mac=AEAD | |
| -DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD | |
| -ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA256 |
| # /etc/apt/apt.conf.d/50fix_apt | |
| APT { | |
| Install-Recommends "false"; | |
| Install-Suggests "false"; AutoRemove { | |
| SuggestsImportant "false"; RecommendsImportant "false"; | |
| } | |
| } | |
| var pattern = /(MOBI|EPUB|PDF|CBZ|PDF \(HQ\))$/i; | |
| var out = ""; | |
| var nodes = document.getElementsByTagName('a'); | |
| for (i in nodes) { | |
| var a = nodes[i]; | |
| if (a && a.text && pattern.test(a.text.trim())) { | |
| out += a.attributes['data-web'].value; | |
| out += "\n"; | |
| } | |
| } |
| option arch code 93 = unsigned integer 16; | |
| if substring(option vendor-class-identifier, 0, 9) = "PXEClient" { | |
| if option arch = 00:02 { # IA64 EFI boot | |
| filename "/NoopApp.efi"; # not the right image, but we don't care | |
| } else if option arch = 00:06 { # x86 EFI boot | |
| filename "/NoopApp.efi"; # not the right image, but we don't care | |
| } else if option arch = 00:07 { # BC (bytecode) EFI boot | |
| filename "/live-efi/elilo.efi"; | |
| } else if option arch = 00:09 { # x64 EFI boot | |
| filename "/live-efi/elilo.efi"; |