Convert mac-os-el-capitan-pkg-to-iso.sh
from using hdiutil
and asr
to using Linux utilities.
Important: You will need about 30GB of free disk space.
#!/usr/bin/bash -xe | |
cat <<EOF > "${HOME}/.config/systemd/user/zoom.slice" | |
[Slice] | |
AllowedCPUs=0-4 | |
MemoryHigh=6G | |
EOF | |
cat /usr/share/applications/Zoom.desktop | sed -E 's#^(Exec=).*$#Exec=/usr/bin/systemd-run --user --slice=zoom.slice /opt/zoom/ZoomLauncher#' > "${HOME}/.local/share/applications/Zoom.desktop" |
#!/bin/sh | |
GITHUB_USER=dennisoelkers | |
if [ "$1" != "" ]; then | |
GITHUB_USER=$1 | |
fi | |
echo "PRs asking me for review:\n" | |
for i in `hub pr list -s open -o update -f '%i;%sH;%H;%U;%ut;%rs%n'|sed 's/ //g'|grep ${GITHUB_USER}`; do |
#!/bin/sh | |
# Returning the status of all open PRs of $1, execute it in the directory of the git repository | |
# Perfect in combination with `watch -n 30 -c pr-check` | |
GITHUB_USER=dennisoelkers | |
if [ "$1" != "" ]; then | |
GITHUB_USER=$1 | |
fi |
Convert mac-os-el-capitan-pkg-to-iso.sh
from using hdiutil
and asr
to using Linux utilities.
Important: You will need about 30GB of free disk space.
package de.spinscale.cluster; | |
import io.undertow.Undertow; | |
import io.undertow.server.handlers.PathTemplateHandler; | |
import io.undertow.util.HttpString; | |
import io.undertow.util.PathTemplateMatch; | |
import org.jgroups.JChannel; | |
import org.jgroups.raft.RaftHandle; | |
import org.jgroups.raft.blocks.ReplicatedStateMachine; |
$ dpkg --compare-versions "1.0-4.1" gt "1.0-4joe5" && echo "NMU version -4.1 greater than -4joe5"
Boot up the Vagrant virtual machine:
$ vagrant up
Build a specific recipe with fpm-cookery:
$ RECIPE=<recipe-name> vagrant provision
The final packages will be located here:
This simple script will take a picture of a whiteboard and use parts of the ImageMagick library with sane defaults to clean it up tremendously.
The script is here:
#!/bin/bash
convert "$1" -morphology Convolve DoG:15,100,0 -negate -normalize -blur 0x1 -channel RBG -level 60%,91%,0.1 "$2"
JSON
# Bind SSL port with PFS-enabling cipher suite | |
bind :443 ssl crt path_to_certificate no-tls-tickets ciphers ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-GCM-SHA384:AES128-SHA256:AES128-SHA:AES256-SHA256:AES256-SHA:!MD5:!aNULL:!DH:!RC4 | |
# Distinguish between secure and insecure requests | |
acl secure dst_port eq 443 | |
# Mark all cookies as secure if sent over SSL | |
rsprep ^Set-Cookie:\ (.*) Set-Cookie:\ \1;\ Secure if secure | |
# Add the HSTS header with a 1 year max-age |