$ man launchd
$ man launchctl
$ man launchd.plist
$ man plutil
curl -H "Accept: application/vnd.github.v3.star+json" https://api.github.com/users/glaforge/starred |
https://ja.wikipedia.org/wiki/JavaScript_Object_Notation
# On slow systems, checking the cached .zcompdump file to see if it must be | |
# regenerated adds a noticable delay to zsh startup. This little hack restricts | |
# it to once a day. It should be pasted into your own completion file. | |
# | |
# The globbing is a little complicated here: | |
# - '#q' is an explicit glob qualifier that makes globbing work within zsh's [[ ]] construct. | |
# - 'N' makes the glob pattern evaluate to nothing when it doesn't match (rather than throw a globbing error) | |
# - '.' matches "regular files" | |
# - 'mh+24' matches files (or directories or whatever) that are older than 24 hours. | |
autoload -Uz compinit |
This guide will demonstrate the steps required to encrypt and decrypt files using OpenSSL on Mac OS X. The working assumption is that by demonstrating how to encrypt a file with your own public key, you'll also be able to encrypt a file you plan to send to somebody else using their private key, though you may wish to use this approach to keep archived data safe from prying eyes.
Assuming you've already done the setup described later in this document, that id_rsa.pub.pcks8 is the public key you want to use, that id_rsa is the private key the recipient will use, and secret.txt is the data you want to transmit…
$ openssl rand 192 -out key
$ openssl aes-256-cbc -in secret.txt -out secret.txt.enc -pass file:key
Revised: 2019-11-28 16:16 GMT-6
This is a list of the key resources I have found useful. If you know of others, please post in a comment below, and I will add to this list.
I have tried to order this list in the order that, to me, is best for learning JXA from scratch. We all learn a bit diferently, so adjust to suit your style/needs. Please post if you have suggestions on learning JXA.
# E.g. to restore Python's virtualenv | |
function shell_session_save_user_state() { | |
echo "function restore_session() {" >> ${SHELL_SESSION_FILE} | |
if [[ -n ${VIRTUAL_ENV} ]]; then | |
echo source \"${VIRTUAL_ENV}\"/bin/activate >> ${SHELL_SESSION_FILE} | |
fi | |
echo "}" >> $SHELL_SESSION_FILE |
# Recently I had to send a password to someone over Skype. Since that's obviously not a good idea, I asked for | |
# the person's public SSH RSA key, and used it to encrypt the password itself. | |
# Convert the public key into PEM format | |
ssh-keygen -f path/to/id_rsa.pub -e -m pem > ~/id_rsa.pub.pem | |
# Using the public pem file to encrypt a string | |
echo "sometext" | openssl rsautl -encrypt -pubin -inkey ~/id_rsa.pub.pem > ~/encrypted.txt |
# prefixキーをC-tに変更する | |
set -g prefix C-t | |
# C-bのキーバインドを解除する | |
unbind C-b | |
# キーストロークのディレイを減らす | |
set -sg escape-time 1 | |
# ウィンドウのインデックスを1から始める |