This is an OpenPGP proof that connects my OpenPGP key to this Github account. For details check out https://keyoxide.org/guides/openpgp-proofs
[Verifying my OpenPGP key: openpgp4fpr:E748BC8840D19D6E233156830BC2CE7401975CB6]
x86_64-darwin paperless-ng | |
i686-linux gnome.gnome-panel | |
x86_64-linux lilypond | |
x86_64-linux arx-libertatis | |
aarch64-linux gnome.gnome-applets | |
aarch64-linux beetsExternalPlugins.extrafiles | |
x86_64-darwin python39Packages.diagrams | |
aarch64-linux optar | |
aarch64-linux solfege | |
i686-linux imagemagickBig |
# API Key | |
First of all create a free account here and create an API key to use the blacklist: https://www.abuseipdb.com | |
# UFW | |
You should have installed and started UFW, test it with | |
```bash | |
ufw status | |
``` | |
# Cronjob |
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install.sh)" | |
defaults write com.apple.finder AppleShowAllFiles YES && killall Finder | |
brew update | |
brew upgrade --all | |
brew install wget curl git zsh nodejs yarn awscli composer python3 htop cask youtube-dl vim | |
brew install qlcolorcode qlstephen qlmarkdown quicklook-json webpquicklook suspicious-package quicklookase qlvideo qlImageSize | |
python3 -m pip3 install --upgrade setuptools |
This is an OpenPGP proof that connects my OpenPGP key to this Github account. For details check out https://keyoxide.org/guides/openpgp-proofs
[Verifying my OpenPGP key: openpgp4fpr:E748BC8840D19D6E233156830BC2CE7401975CB6]
#!/bin/bash | |
## update system | |
#### | |
sudo dnf update -y | |
## repos | |
#### | |
sudo dnf install -y https://download1.rpmfusion.org/free/fedora/rpmfusion-free-release-$(rpm -E %fedora).noarch.rpm | |
sudo dnf install -y https://download1.rpmfusion.org/nonfree/fedora/rpmfusion-nonfree-release-$(rpm -E %fedora).noarch.rpm |
../eyyxo.torrent: | |
Name: Hacked Team | |
Size: 415768052618 (387G) | |
Announce: udp://coppersurfer.tk:6969/announce | |
Files: | |
Amministrazione/01 - CLIENTI/1 - Commesse/1 - Commesse 2011/Commessa001.2011 Royal.xls 59392 (58K) | |
Amministrazione/01 - CLIENTI/1 - Commesse/1 - Commesse 2011/Commessa002.2011 Royal.xls 59392 (58K) | |
Amministrazione/01 - CLIENTI/1 - Commesse/1 - Commesse 2011/Commessa003.2011 Royal.xls |
description "Starts a SimpleHTTPServer to host 1 Password Anywhere" | |
author "Ivan De Marino <[email protected]>" | |
version "1.0.0" | |
# When to start/stop | |
start on runlevel [2345] | |
stop on runlevel [016] | |
# Keep it running | |
respawn |
I don't think AgileBits Inc. is so small nor Dropbox Inc. so big that they couldn't cooperate to smooth the migration from full access to app sandbox.
The highlights:
In our recent newsletter I had planned to share my New Year resolution to get organized and how I am using 1Password for Teams to keep my Family and Work information separate. It got too long for a newsletter so I thought I'd write a blog post instead.
First, a little bit of history is in order. I started using 1Password nearly 10 years ago and have accumulated well over 2000 items during that time. These thousands of items include work, personal, and family logins, secure notes, and just about anything else you can think of.
Here's just a few of the things I have in 1Password:
#!/bin/bash | |
LOCALADMIN="username" | |
kickstart=/System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/Resources/kickstart | |
echo "Configuring Remote Management" | |
if id -u $LOCALADMIN >/dev/null 2>&1; then | |
echo "Defined local admin account exists" | |
# Deactivate ARD agent, deny all access | |
echo "Deactivating ARD agent" |