I hereby claim:
- I am amritanshu-pandey on github.
- I am amritanshupandey (https://keybase.io/amritanshupandey) on keybase.
- I have a public key ASDgem5nCZonIzWuBCJjmO6EtyH1HQ2WC8v-mG-PtbAdPAo
To claim this, I am signing this object:
| Send-MailMessage ` | |
| -To "[email protected]" ` | |
| -CC "[email protected]" ` | |
| -Subject "Hello from Poweshell" ` | |
| -Body "Hello Receiver" ` | |
| -SmtpServer "smtp.gmail.com" ` | |
| -From "[email protected]" ` | |
| -Port 587 ` | |
| -UseSsl ` | |
| -Credential "test_password" ` |
| Send-MailMessage ` | |
| -To "[email protected]" ` | |
| -CC "[email protected]" ` | |
| -Subject "Hello from Poweshell" ` | |
| -Body "Hello Receiver" ` | |
| -SmtpServer "smtp.gmail.com" ` | |
| -From "[email protected]" ` | |
| -Port 587 ` | |
| -UseSsl ` | |
| -Credential (Import-Clixml .\credentials.xml) ` |
I hereby claim:
To claim this, I am signing this object:
| #!/bin/bash | |
| ## Remove or edit this sample code as per your requirement | |
| if [ -d "${HOME}/.ssh" ]; then | |
| echo "Setting permission for \"${HOME}\"/.ssh" | |
| chmod -R 700 "${HOME}"/.ssh | |
| fi | |
| pyenv install 3.6.5 | |
| pyenv install 3.7.0b3 | |
| nodenv install 9.11.1 |
| version: '2' | |
| services: | |
| elasticsearch: | |
| image: docker.elastic.co/elasticsearch/elasticsearch-platinum:6.2.4 | |
| ports: | |
| - 9200:9200 | |
| - 9300:9300 | |
| environment: | |
| - 'discovery.type=single-node' | |
| - 'ELASTIC_PASSWORD=elastic' |
| #requires -version 4 | |
| <# | |
| .SYNOPSIS | |
| Restic backup script. | |
| .DESCRIPTION | |
| Use Restic to perform backups to Backblaze B2. | |
| .PARAMETER Repository | |
| The path to the Restic repository, e.g. 'b2:my-named-repo'. |
Source: https://www.howtoforge.com/tutorial/passwordless-encryption-of-linux-root-partition/
The process of entering the passphrase at boot time will now be automated using an USB memory stick. Instead of using a passphrase , the secret key on the USB will decrypt the encrypted volumes. Connect an USB stick to the VM and locate it using the dmesg command. It is detected as /dev/sdb in my VM.
The secret key of 8192 random byte is extracted from the usb stick using the dd command.
dd if=/dev/sdb of=/root/secret.key bs=512 skip=4 count=16
| kind: Deployment | |
| apiVersion: apps/v1 | |
| metadata: | |
| name: nfs-client-provisioner | |
| spec: | |
| selector: | |
| matchLabels: | |
| app: nfs-client-provisioner | |
| replicas: 1 | |
| strategy: |