BRK1036
Building applications with Microsoft Azure Service Fabric on Windows and LinuxBRK1042
Run Bash scripts from Windows 10BRK2085
Understand the future of software development in the cloud with the Azure Application PlatformBRK2102
Transform yourself and build your IT cloud career pathBRK2122
Use Azure Security Center to prevent, detect, and respond to threatsBRK2156
Reinvent disaster recovery leveraging Microsoft Azure cloud infrastructureBRK2158
See Why Microsoft Loves Linux and Open SourceBRK2194
Azure Compute and Cloud ApplicationsBRK2199
Satisfy your need for speed - Hendrick Motorsports and Azure, winning togetherBRK2201
Dive into Scenarios and Customer Success Stories with Azure Storage
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
aad_tenant_id = "f1c9b125-e2bf-48c0-b025-23e47c410293" | |
client_id = "1326f47c-eaea-42aa-8aa8-ff99fbaf3da9" | |
client_secret = "..." | |
aad_host = "https://login.microsoftonline.de/" | |
management_url = "https://management.microsoftazure.de/" | |
fiddler_opts = [ proxy: "http://127.0.0.1:8888", ssl_options: [ cacertfile: "/Users/chgeuer/Desktop/fiddler.cer"] ] | |
token = OAuth2.Client.new([ | |
strategy: OAuth2.Strategy.ClientCredentials, | |
site: aad_host <> aad_tenant_id, | |
token_url: "/oauth2/token?api-version=1.0", |
- Open the current packer log file in the
TEMP
directory, something like%TEMP%packer-log722498239
, in a text editor. - Find the string
\"osProfile\":{\"adminPassword\":\"
. There you can see your admin password, something like9RQF11ZTRL1W3YfQN3LpJ7Jib9gfkgXa
... - Figure out the public IP address of your Windows VM, for example through resources.azure.com.
- Run the following:
$address = "13.81.111.231"
I created VMs (OpenLogic/CentOS/7.2/latest) with "disablePasswordAuthentication": "true"
(See my template. My local username is "chgeuer".
When I launch VMs in "Europe West" / Amsterdam, the file /etc/sudoers.d/waagent
reads like this:
chgeuer ALL = (ALL) NOPASSWD: ALL
So I can sudo su
without a password prompt. Good!
When I look at my Germany Central / Frankfurt VM, the file /etc/sudoers.d/waagent
reads like this:
- http://huaweip8.jniklast.bplaced.net/index.html
- https://github.com/honor6-dev
- http://forum.xda-developers.com/p8lite/general/huawei-p8-lite-android-6-0-marshmallow-t3305550
- http://forum.xda-developers.com/huawei-p8
- http://forum.xda-developers.com/huawei-p8/how-to/ota-update-gra-l09-android-6-0-t3268757
- http://www.huaweifirmware.com/huawei-p8-lite
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
echo "$2" > host.txt | |
apt-get update -y | |
apt-get install -y unzip apache2 php5 php5-mysql | |
/usr/sbin/a2enmod rewrite expires headers | |
tar xvfz "$1" --directory / |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// problem ? | |
// Microsoft.IdentityModel.Clients.ActiveDirectory.3.9.302111717-alpha\lib\net45\Microsoft.IdentityModel.Clients.ActiveDirectory.dll | |
private static X509Certificate2 FromStore(string certThumbPrint) | |
{ | |
var store = new X509Store(storeName: StoreName.My, storeLocation: StoreLocation.CurrentUser); | |
try | |
{ | |
store.Open(OpenFlags.ReadOnly); | |
var cert = store.Certificates.Find( |