MD5: 59bab8f71f8c096cd3f72cd73851515d
Rename it to: Sublime Text
Make it executable with: chmod u+x Sublime\ Text
#!/usr/bin/env python | |
# Reflects the requests from HTTP methods GET, POST, PUT, and DELETE | |
# Written by Nathan Hamiel (2010) | |
from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler | |
from optparse import OptionParser | |
class RequestHandler(BaseHTTPRequestHandler): | |
def do_GET(self): |
#!/bin/bash | |
usage() { | |
cat << EOF | |
Usage: $0 [OPTION]... COMMAND | |
Execute the given command in a way that works safely with cron. This should | |
typically be used inside of a cron job definition like so: | |
* * * * * $(which "$0") [OPTION]... COMMAND | |
Arguments: |
#!/bin/sh | |
# Configure homebrew permissions to allow multiple users on MAC OSX. | |
# Any user from the admin group will be able to manage the homebrew and cask installation on the machine. | |
# allow admins to manage homebrew's local install directory | |
chgrp -R admin /usr/local | |
chmod -R g+w /usr/local | |
# allow admins to homebrew's local cache of formulae and source files | |
chgrp -R admin /Library/Caches/Homebrew |
Those are my personal notes on AWS Solution Architect certification preparation. Hope you find them usefull.
To pass AWS certification, you should have:
#!/bin/bash | |
vault mount -path=rootpki pki | |
vault mount-tune -max-lease-ttl="175200h" rootpki | |
vault write rootpki/root/generate/exported common_name=example.com ttl="175200h" | |
vault write rootpki/root/generate/internal common_name=example.com ttl="175200h" | |
vault write rootpki/intermediate/generate/exported common_name=example.com ttl="175200h" | |
vault write rootpki/intermediate/generate/internal common_name=example.com ttl="175200h" | |
vault mount -path=intermediatepki pki | |
vault mount-tune -max-lease-ttl="8760h" intermediatepki |
A curated list of AWS resources to prepare for the AWS Certifications
A curated list of awesome AWS resources you need to prepare for the all 5 AWS Certifications. This gist will include: open source repos, blogs & blogposts, ebooks, PDF, whitepapers, video courses, free lecture, slides, sample test and many other resources.
This is a guide that I wrote to improve the default security of my website https://fortran.io , which has a certificate from LetsEncrypt. I'm choosing to improve HTTPS security and transparency without consideration for legacy browser support.
I would recommend these steps only if you have a specific need for information security, privacy, and trust with your users, and/or maintain a separate secure.example.com domain which won't mess up your main site. If you've been thinking about hosting a site on Tor, then this might be a good option, too.
The best resources that I've found for explaining these steps are https://https.cio.gov , https://certificate-transparency.org , and https://twitter.com/konklone
https://gnu-linux.org/building-ubuntu-rootfs-for-arm.html | |
"2) Extract the downloaded image with ‘sudo’ to allow ‘mknod’ commands to work" | |
# get a cloud image from here | |
# https://cloud-images.ubuntu.com/daily/server/xenial/ | |
# https://cloud-images.ubuntu.com/daily/server/xenial/current/ | |
# based on https://bazaar.launchpad.net/~maas-images-maintainers/maas-images/maas-ephemerals/view/head:/bin/img2squashfs#L161 | |
# extract a cloud image rootfs to a directory, sudo is needed for `mknod`s to work | |
# doesn't have to be .tar.gz - could well unsquashfs an existing squashfs |
#### Contents of the preconfiguration file (for stretch) | |
### Localization | |
# Preseeding only locale sets language, country and locale. | |
d-i debian-installer/locale string en_US.UTF-8 | |
# The values can also be preseeded individually for greater flexibility. | |
#d-i debian-installer/language string en | |
#d-i debian-installer/country string US | |
#d-i debian-installer/locale string en_US.UTF-8 |