deekaying
I hereby claim:
- I am deekayen on github.
- I am deekaying (https://keybase.io/deekaying) on keybase.
- I have a public key ASAJOKqzXNqQ3kUCveLVlCD_h-Or7sP_FqzY1gQmbK_jEgo
To claim this, I am signing this object:
chmod +x post-commit | |
find . -name hooks -type d -maxdepth 4 -exec cp post-commit {} \; |
#!/bin/bash | |
# Set your GitHub username and token | |
username="your_username" | |
token="your_token" | |
org="your_org" | |
# Get the list of repositories in the organization | |
repos=$(curl -s -u $username:$token https://api.github.com/orgs/$org/repos | jq -r '.[].clone_url') | |
# https://4sysops.com/archives/find-the-product-guid-of-installed-software-with-powershell/ | |
$UninstallKeys = "HKLM:\Software\Microsoft\Windows\CurrentVersion\Uninstall", "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" | |
$null = New-PSDrive -Name HKU -PSProvider Registry -Root Registry::HKEY_USERS | |
$UninstallKeys += Get-ChildItem HKU: -ErrorAction SilentlyContinue | Where-Object { $_.Name -match 'S-\d-\d+-(\d+-){1,14}\d+$' } | ForEach-Object { "HKU:\$($_.PSChildName)\Software\Microsoft\Windows\CurrentVersion\Uninstall" } | |
foreach ($UninstallKey in $UninstallKeys) { | |
Get-ChildItem -Path $UninstallKey -ErrorAction SilentlyContinue | Where {$_.PSChildName -match '^{[A-Z0-9]{8}-([A-Z0-9]{4}-){3}[A-Z0-9]{12}}$'} | Select-Object @{n='GUID';e={$_.PSChildName}}, @{n='Name'; e={$_.GetValue('DisplayName')}} | |
} |
deekaying
I hereby claim:
To claim this, I am signing this object:
_______ | |
< N4DKN > | |
------- | |
\ | |
\ _.-````'-,_ | |
_,.,_ ,-'` `'-.,_ | |
/) ( '``-. | |
(( ) ) `\ | |
\) (_/ )\ | |
| /) ' ,' / \ |
proxy-dns: true | |
proxy-dns-port: 5053 | |
proxy-dns-upstream: | |
- https://doh.cleanbrowsing.org/doh/adult-filter/ | |
- https://family.cloudflare-dns.com/dns-query | |
- https://dns-family.adguard.com/dns-query |
{ | |
"Working Directory" : "\/Users\/deekayen", | |
"Prompt Before Closing 2" : 0, | |
"Selected Text Color" : { | |
"Green Component" : 1, | |
"Blue Component" : 0.999828040599823, | |
"Red Component" : 0.99989014863967896 | |
}, | |
"Rows" : 25, | |
"Ansi 11 Color" : { |
Help yourself get a quick idea what services are permitted for HIPAA protected PHI in AWS. AWS gives you a list that's formatted in all the formal marketing names, but this translates it to the AWS CLI commands.
This list was manually generated from the AWS HIPAA Eligible Services Reference based on me using my eyeballs to compare the reference page to the AWS CLI version 2 documentation list of commands. I infered some commands like appconfig
as a capability of Systems Manager, or dlm
as part of Elastic Block Store which is are permitted services.
You should expect to find errors, omissions, and other legal problems, as you should expect from random, free stuff you find on the Internet.
#!/bin/zsh | |
saml2aws exec 'aws-list-all query --parallel 1 --region us-east-1 | grep "+++" | cut -d" " -f2 | sort | uniq' |
--- | |
default: | |
image: | |
name: cytopia/ansible:latest-tools | |
entrypoint: ["/bin/sh", "-c"] | |
tags: | |
- kubernetes | |
ansible-lint: |