#Adding an existing project to GitHub using the command line
Simple steps to add existing project to Github.
In Terminal, change the current working directory to your local project.
##2. Initialize the local directory as a Git repository.
git init
1) Filter Table
Filter is default table for iptables. So, if you don’t define you own table, you’ll be using filter table. Iptables’s filter table has the following built-in chains.
For those of you who want to try out systemd-networkd, you can read on, and find out in this tutorial how to switch from NetworkManager to systemd-networkd on Linux.
Requirement systemd-networkd is available in systemd version 210 and higher. Check the version of your systemd before proceeding.
$ systemctl --version
It is relatively straightforward to switch from Network Manager to systemd-networkd (and vice versa).
Should be work with 0.18
Destructuring(or pattern matching) is a way used to extract data from a data structure(tuple, list, record) that mirros the construction. Compare to other languages, Elm support much less destructuring but let's see what it got !
myTuple = ("A", "B", "C")
myNestedTuple = ("A", "B", "C", ("X", "Y", "Z"))| import Data.Maybe | |
| import Control.Monad | |
| import Control.Applicative | |
| import Graphics.Gloss | |
| import Graphics.Gloss.Interface.Pure.Game | |
| type Coordinates = (Int, Int) | |
| data Player = Nought | Cross |
IPTables is the Firewall service that is available in a lot of different Linux Distributions. While modifiying it might seem daunting at first, this Cheat Sheet should be able to show you just how easy it is to use and how quickly you can be on your way mucking around with your firewall.
The following list is a great set of documentation for iptables. I used them to compile this documentation.
This gist lists only the basic commands to test REST APIs with curl. If you need something more advanced, this book has everything you may need.
Display the response only
| (* | |
| This is an F# interactive script to generate a JWT. You can use it as a reference for when you are generating JWT on | |
| your server for a client, for example. It is hard coded for symmetric signing (HS256), but can be modified for | |
| asymmetric signing RS256, see notes. | |
| *) | |
| #r "nuget: System.IdentityModel.Tokens.Jwt" | |
| open System | |
| open System.Text // for Encoding | |
| open System.IdentityModel.Tokens.Jwt // For JwtSecurityToken (Install it from Nuget) | |
| open System.Security.Claims // For Claim, ClaimTypes |
In the last years I've been asked multiple times about the comparison between raylib and SDL libraries. Unfortunately, my experience with SDL was quite limited so I couldn't provide a good comparison. In the last two years I've learned about SDL and used it to teach at University so I feel that now I can provide a good comparison between both.
Hope it helps future users to better understand this two libraries internals and functionality.