I hereby claim:
- I am artburkart on github.
- I am artburkart (https://keybase.io/artburkart) on keybase.
- I have a public key ASB73UEdBQZyOWG1_3u68txBcSBXj3KoXpXySbBrl-qWgwo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
-- https://www.hammerspoon.org/go/#window-sizing | |
-- https://stackoverflow.com/questions/54151343/how-to-move-an-application-between-monitors-in-hammerspoon | |
-- https://github.com/fikovnik/ShiftIt/issues/296#issuecomment-438386501 | |
hs.hotkey.bind({"cmd", "alt", "ctrl"}, "r", function() | |
hs.reload() | |
end) | |
hs.alert.show("Config loaded") | |
hs.window.animationDuration = 0 | |
units = { |
Create private key and signing request:
openssl genrsa 4096 > privatekey.pem
openssl req -new -key privatekey.pem -out csr.pem -config config.ini
The output looks like this:
#!/usr/bin/env bash | |
openssl rand -base64 100 | tr -dc A-Za-z0-9 | head -c32 |
#!/usr/bin/env bash | |
# https://askubuntu.com/questions/152001/how-can-i-get-octal-file-permissions-from-command-line#152003 | |
stat -c "%a %n" /usr/bin | |
stat -c "%a %n" * |
alert('testing xss vulnerability'); |
#!/bin/bash | |
# This takes advantage of the code in /etc/sysconfig/network-scripts/ifup-routes | |
# handle_file () { | |
# . $1 | |
# routenum=0 | |
# while [ "x$(eval echo '$'ADDRESS$routenum)x" != "xx" ]; do | |
# eval $(ipcalc -p $(eval echo '$'ADDRESS$routenum) $(eval echo '$'NETMASK$routenum)) | |
# line="$(eval echo '$'ADDRESS$routenum)/$PREFIX" | |
# if [ "x$(eval echo '$'GATEWAY$routenum)x" != "xx" ]; then |
package main | |
import ( | |
"github.com/bronze1man/goStrongswanVici" | |
"github.com/davecgh/go-spew/spew" | |
"strings" | |
) | |
type Status map[string]map[string]string |
const AWS = require('aws-sdk'); | |
// Gets copy of default provider chain | |
const chain = AWS.CredentialProviderChain.defaultProviders.slice(0); | |
// Inserts additional check for specific profile in ~/.aws/credentials file | |
chain.splice(2, 0, () => new AWS.SharedIniFileCredentials({profile: 'readonly_user'})); | |
// Creates credential resolver that uses my custom provider chain | |
const credentialProvider = new AWS.CredentialProviderChain(chain); |
Ran this query through Grafana: | |
SELECT mean("thread_cache_needed") AS "Thread Cache Needed" FROM (SELECT 100 - (("threads_created" / "connections") * 100) AS "thread_cache_needed" FROM "mysql" WHERE $timeFilter AND "host" = 'ip-10-20-0-127.ec2.internal' fill(null)) WHERE $timeFilter GROUP BY time($__interval) fill(null) | |
InfluxDB Log: | |
...snip..... | |
[I] 2017-08-03T18:13:12Z SELECT mean(thread_cache_needed) AS "Thread Cache Needed" FROM (SELECT 100 - ((threads_created / connections) * 100) AS thread_cache_needed FROM simplisafe.autogen.mysql WHERE time > 1500514212972ms AND time < 1500522389529ms AND host = '10.0.0.1') WHERE time > 1500514212972ms AND time < 1500522389529ms GROUP BY time(30s) service=query |