This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Disable SSLv3 on Windows.(POODLE vulnerability) | |
# https://technet.microsoft.com/en-us/library/security/3009008.aspx | |
registry_value { "Disable SSLv3 for IE": | |
path => 'HKLM\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\SecureProtocols', | |
ensure => present, | |
type => 'dword', | |
data => 128, | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@ECHO OFF | |
REM Get Administrator Privilege on Windows 6+ | |
>nul 2>&1 "%SYSTEMROOT%\system32\cacls.exe" "%SYSTEMROOT%\system32\config\system" | |
IF '%errorlevel%' NEQ '0' ( | |
ECHO Requesting administrative privileges... | |
GOTO UACPrompt | |
) ELSE ( GOTO gotAdmin ) | |
:UACPrompt |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# -*- coding: utf-8 -*- | |
from biplist import readPlist,writePlist | |
import re | |
import os.path | |
import xml.etree.ElementTree as et | |
def change_lang_zh(opf): | |
opftree = et.parse(opf) |
NewerOlder