Apple Software Update XML catalog: https://swcatalog.apple.com/content/catalogs/others/index-windows-1.sucatalog
As of 2023-12-14, direct downloading URLs of the individual installers:
#!/bin/bash | |
ACTIVE_REPO_DIR="/etc/yum.repos.d" | |
BACKUP_REPO_DIR="$ACTIVE_REPO_DIR/backup" | |
STATUS_FILE="/etc/yum.repos.d/CENTOS7_EOL_REPO_URL_PATCHED.txt" | |
CENTOS_VAULT_SERVER_BASE="https://mirrors.aliyun.com/centos-vault" | |
EPEL_RPM_URL="https://mirrors.aliyun.com/epel-archive/7/x86_64/Packages/e/epel-release-7-14.noarch.rpm" | |
EPEL_REPO="epel.repo" | |
EPEL_VAULT_SERVER_BASE="https://mirrors.aliyun.com/epel-archive" |
Apple Software Update XML catalog: https://swcatalog.apple.com/content/catalogs/others/index-windows-1.sucatalog
As of 2023-12-14, direct downloading URLs of the individual installers:
# I'm facing similar issue like [1] and [2], | |
# as of today (2021-09-18) CentOS Stream 8 installer does not list any OpenSCAP backed "Security Profile". | |
# By reading source code at [3] and [4], I figured out a way to make CentOS Stream 8 to read and use CentOS 8 and RHEL 8 security profiles. | |
#################################################### WARNING ########################################################## | |
# CentOS 8 or CentOS Stream 8 are not certified with RHEL 8 profiles, you may not get them through compliance audits. # | |
# Use this at your own risk. # | |
####################################################################################################################### | |
# Step 1, at the language selection page, don't click next, but switch to a virtual console, type the 2 commands below |
The RHEL8 offcial kernel and Oracle RHCK kernel have removed FC target support of QLogic HBAs.
But Oracle's UEK kernel still has relevant kernel modules.
Userland tools like targetcli depends on python3-rtslib, qla2xxx support is implemented but commented out.
Commands below would unmask qla2xxx support, so it will show up in targetcli's ls
output.
sed -i s'/^# "qla2xxx"/ "qla2xxx"/' /usr/lib/python3.6/site-packages/rtslib/fabric.py
sed -i s'/^# "qla2xxx"/ "qla2xxx"/' /usr/lib/python3.6/site-packages/rtslib_fb/fabric.py
#!/bin/bash | |
# Steps | |
# 1. Install Linux subsystem | |
# 2. Install a Linux distro in Windows 10, e.g. Ubuntu | |
# 3. Create a symbolic link to your ContentDeliveryManager Assets directory | |
# yourname@YOURMACHINE:~$ ln -s /mnt/c/Users/_YOUR_WINDOWS_USERNAME_/AppData/Local/Packages/Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy/LocalState/Assets spotlight-assets | |
# 4. Create a directory in your D drive, named "SpotlightPhotos" | |
# 5. Run this script from your home directory |
<?xml version="1.0" encoding="utf-8"?> | |
<unattend xmlns="urn:schemas-microsoft-com:unattend"> | |
<servicing></servicing> | |
<settings pass="windowsPE"> | |
<component name="Microsoft-Windows-Setup" processorArchitecture="amd64" publicKeyToken="31bf3856ad364e35" language="neutral" versionScope="nonSxS" xmlns:wcm="http://schemas.microsoft.com/WMIConfig/2002/State" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> | |
<DiskConfiguration> | |
<WillShowUI>OnError</WillShowUI> | |
<Disk wcm:action="add"> | |
<CreatePartitions> | |
<CreatePartition wcm:action="add"> |
Verizon Wireless assigns you ONE IPv4 address and ONE /64 IPv6 prefix for their cellular service, and VZW would reset your datalink once they received 1 packet with an illegal source address.
We have NAT for IP but for IPv6 we would like to avoid address translation to get some kind of end-to-end communication.
NPTv6, defined in RFC6296, would help us to do stateless prefix translation for IPv6.
If you ever need to access HTTPS site from a Cisco router running IOS, whether it's the copy command or TR-069 client or DDNS HTTP client, the request won't go through, because the SSL/TLS certificate (chain) provided by the server cannot be validated.
Setup trustpool policy
crypto pki trustpool policy
cabundle url http://www.cisco.com/security/pki/trs/ios.p7b
chain-validation
Official documentation on HE.net DDNS, you have to logout or open another browser session to check it out: https://dns.he.net