I hereby claim:
- I am artburkart on github.
- I am artburkart (https://keybase.io/artburkart) on keybase.
- I have a public key ASB73UEdBQZyOWG1_3u68txBcSBXj3KoXpXySbBrl-qWgwo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
| -- https://www.hammerspoon.org/go/#window-sizing | |
| -- https://stackoverflow.com/questions/54151343/how-to-move-an-application-between-monitors-in-hammerspoon | |
| -- https://github.com/fikovnik/ShiftIt/issues/296#issuecomment-438386501 | |
| hs.hotkey.bind({"cmd", "alt", "ctrl"}, "r", function() | |
| hs.reload() | |
| end) | |
| hs.alert.show("Config loaded") | |
| hs.window.animationDuration = 0 | |
| units = { |
Create private key and signing request:
openssl genrsa 4096 > privatekey.pem
openssl req -new -key privatekey.pem -out csr.pem -config config.iniThe output looks like this:
| #!/usr/bin/env bash | |
| openssl rand -base64 100 | tr -dc A-Za-z0-9 | head -c32 |
| #!/usr/bin/env bash | |
| # https://askubuntu.com/questions/152001/how-can-i-get-octal-file-permissions-from-command-line#152003 | |
| stat -c "%a %n" /usr/bin | |
| stat -c "%a %n" * |
| alert('testing xss vulnerability'); |
| #!/bin/bash | |
| # This takes advantage of the code in /etc/sysconfig/network-scripts/ifup-routes | |
| # handle_file () { | |
| # . $1 | |
| # routenum=0 | |
| # while [ "x$(eval echo '$'ADDRESS$routenum)x" != "xx" ]; do | |
| # eval $(ipcalc -p $(eval echo '$'ADDRESS$routenum) $(eval echo '$'NETMASK$routenum)) | |
| # line="$(eval echo '$'ADDRESS$routenum)/$PREFIX" | |
| # if [ "x$(eval echo '$'GATEWAY$routenum)x" != "xx" ]; then |
| package main | |
| import ( | |
| "github.com/bronze1man/goStrongswanVici" | |
| "github.com/davecgh/go-spew/spew" | |
| "strings" | |
| ) | |
| type Status map[string]map[string]string |
| const AWS = require('aws-sdk'); | |
| // Gets copy of default provider chain | |
| const chain = AWS.CredentialProviderChain.defaultProviders.slice(0); | |
| // Inserts additional check for specific profile in ~/.aws/credentials file | |
| chain.splice(2, 0, () => new AWS.SharedIniFileCredentials({profile: 'readonly_user'})); | |
| // Creates credential resolver that uses my custom provider chain | |
| const credentialProvider = new AWS.CredentialProviderChain(chain); |
| Ran this query through Grafana: | |
| SELECT mean("thread_cache_needed") AS "Thread Cache Needed" FROM (SELECT 100 - (("threads_created" / "connections") * 100) AS "thread_cache_needed" FROM "mysql" WHERE $timeFilter AND "host" = 'ip-10-20-0-127.ec2.internal' fill(null)) WHERE $timeFilter GROUP BY time($__interval) fill(null) | |
| InfluxDB Log: | |
| ...snip..... | |
| [I] 2017-08-03T18:13:12Z SELECT mean(thread_cache_needed) AS "Thread Cache Needed" FROM (SELECT 100 - ((threads_created / connections) * 100) AS thread_cache_needed FROM simplisafe.autogen.mysql WHERE time > 1500514212972ms AND time < 1500522389529ms AND host = '10.0.0.1') WHERE time > 1500514212972ms AND time < 1500522389529ms GROUP BY time(30s) service=query |