Requirements is OpenSSL and Bash. It generates password for AES encryption, encrypt file and then it encrypt password with your public key. Tested on Ubuntu 16.04...
- generate public key from your private key:
| #include <OneWire.h> | |
| #include <EtherCard.h> | |
| #include <avr/wdt.h> | |
| // milliseconds to wait for data send | |
| #define REQUEST_RATE 60000 | |
| // ethernet module RST pin | |
| #define ETHERNET_RST 6 |
| <?php | |
| // some settings first | |
| $rrdtool = "/usr/bin/rrdtool"; | |
| $rrd = "temps.rrd"; | |
| $png = "temps.png"; | |
| $pngUptime = "temps.uptime.png"; | |
| $last = "temps.last.txt"; | |
| // parse data from request |
| <?php | |
| $c = new Client('https://poste.io/admin/api/v1/', '[email protected]', 'admin'); | |
| $c->delete('domains/t.com'); | |
| $c->post('domains', ['name' => 't.com']); | |
| $c->post('boxes', ['email' => '[email protected]', 'passwordPlaintext' => 't', 'name' => 't']); | |
| $c->patch('boxes/[email protected]', ['name' => 'a', 'disabled' => true, 'passwordPlaintext' => 'a']); |
| NOVA(CESKE RADIOKOMUNIKACE):690000000:INVERSION_AUTO:BANDWIDTH_8_MHZ:FEC_2_3:FEC_NONE:QAM_64:TRANSMISSION_MODE_8K:GUARD_INTERVAL_1_4:HIERARCHY_NONE:101:111:513 | |
| NOVA CINEMA(CESKE RADIOKOMUNIKACE):690000000:INVERSION_AUTO:BANDWIDTH_8_MHZ:FEC_2_3:FEC_NONE:QAM_64:TRANSMISSION_MODE_8K:GUARD_INTERVAL_1_4:HIERARCHY_NONE:401:411:514 | |
| Prima COOL(CESKE RADIOKOMUNIKACE):690000000:INVERSION_AUTO:BANDWIDTH_8_MHZ:FEC_2_3:FEC_NONE:QAM_64:TRANSMISSION_MODE_8K:GUARD_INTERVAL_1_4:HIERARCHY_NONE:501:511:770 | |
| Prima(CESKE RADIOKOMUNIKACE):690000000:INVERSION_AUTO:BANDWIDTH_8_MHZ:FEC_2_3:FEC_NONE:QAM_64:TRANSMISSION_MODE_8K:GUARD_INTERVAL_1_4:HIERARCHY_NONE:601:611:773 | |
| BARRANDOV TV(CESKE RADIOKOMUNIKACE):690000000:INVERSION_AUTO:BANDWIDTH_8_MHZ:FEC_2_3:FEC_NONE:QAM_64:TRANSMISSION_MODE_8K:GUARD_INTERVAL_1_4:HIERARCHY_NONE:301:311:2050 | |
| CT 1(Ceska televize):698000000:INVERSION_AUTO:BANDWIDTH_8_MHZ:FEC_2_3:FEC_NONE:QAM_64:TRANSMISSION_MODE_8K:GUARD_INTERVAL_1_4:HIERARCHY_NONE:257:273:257 | |
| CT 2(Ceska televize):698000000:INVERSION_AUTO:BA |
| <div id="seznam-programu"></div> | |
| <script> | |
| var url = "https://fixnet.cz/programy-source-data"; | |
| var el = document.getElementById("seznam-programu"); | |
| var xhr = new XMLHttpRequest(); | |
| xhr.onreadystatechange = function(){ | |
| if (xhr.readyState == 4 && xhr.status == 200){ | |
| el.innerHTML = xhr.responseText; | |
| } |
| #!/usr/bin/env bash | |
| set -e | |
| PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin | |
| PROGNAME=`basename $0` | |
| OID_GENERAL_ALARM="1.3.6.1.4.1.9839.2.1.1.23" | |
| OID_ALARMS=( | |
| "1.3.6.1.4.1.9839.2.1.1.5:High Pressure Alarm" | |
| "1.3.6.1.4.1.9839.2.1.1.6:Low Pressure Alarm" |
| #!/usr/bin/expect | |
| ;# | |
| ;# quick "Expect" language manual at https://gist.github.com/analogic/95d2972b61b81ada177f620f847f6b51 | |
| ;# | |
| lassign $argv userhost password interface port json | |
| if {$port eq ""} { | |
| puts "Help: ./dslam.expect <user@host> <password> <interface> <port> \[json\]" | |
| puts " " |
TCL-Expect scripts are an amazingly easy way to script out laborious tasks in the shell when you need to be interactive with the console. Think of them as a "macro" or way to programmaticly step through a process you would run by hand. They are similar to shell scripts but utilize the .tcl extension and a different #! call.
The first step, similar to writing a bash script, is to tell the script what it's executing under. For expect we use the following:
#!/usr/bin/expect
| package main | |
| import ( | |
| "fmt" | |
| "runtime" | |
| "time" | |
| "bytes" | |
| "strings" | |
| "github.com/kidoman/embd" |