#! /bin/bash | |
export ARCH=$(uname -m) | |
echo "INFO:Generator:Searching AppDir" | |
read -p "? ID [Eg: com.example.app]: " appId | |
read -p "? Application Name: " appName | |
read -p "? Icon: " appIcon | |
read -p "? Executable path relative to AppDir [usr/bin/app]: " appExec | |
# read -p "? Arguments [Default: $@]: " appExec_args |
from bitmerchant.wallet import Wallet | |
from mnemonic import Mnemonic | |
# put in whatever Trezor generates for you here (or backup from this empty/insecure one as a test) | |
mnemonic = 'clean health food open blood network differ female lion eagle rough upon update zone antique defense venture uncover mobile charge actress film vocal enough' | |
passphrase = '' # empty string or whatever you actually choose | |
path = "m/44'/0'/0'/0/0" # whatever shows up on the UI for that account (everything will start with m/44'/0' since it's bip44) | |
child = Wallet.from_master_secret(Mnemonic('english').to_seed(mnemonic, passphrase)).get_child_for_path(path) | |
child.to_address() # '18K9axbPpwqZgngB58nuwsYevL2z6ey4YG' (confirm this matches what Trezor is showing you) |
# Use the Ubuntu Linux distro as the base for this image | |
FROM ubuntu | |
# Install necessary build tools | |
RUN apt-get update && apt-get upgrade --yes && apt-get install build-essential clang git --yes | |
# Download and install PseudoNode | |
RUN cd /root && git clone https://github.com/basil00/PseudoNode.git && cd ./PseudoNode && make | |
# These two commands enable port 8333 to be routed and start the node by default | |
EXPOSE 8333 | |
CMD ["bash", "-c", "cd /root/PseudoNode && ./pseudonode --stealth --coin=bitcoin-xt"] |
function transfer | |
if test (count $argv) -eq 0 | |
echo "No arguments specified. Usage:\necho transfer /tmp/test.md\ncat /tmp/test.md | transfer test.md" | |
return 1 | |
end | |
## get temporarily filename, output is written to this file show progress can be showed | |
set tmpfile ( mktemp -t transferXXX ) | |
## upload stdin or file |
This is a guide on how to email securely.
There are many guides on how to install and use PGP to encrypt email. This is not one of them. This is a guide on secure communication using email with PGP encryption. If you are not familiar with PGP, please read another guide first. If you are comfortable using PGP to encrypt and decrypt emails, this guide will raise your security to the next level.
Grab ffmpeg from https://www.ffmpeg.org/download.html
It's a command line tool which means you will have to type things with your keyboard instead of clicking on buttons.
The most trivial operation would be converting gifs:
ffmpeg -i your_gif.gif -c:v libvpx -crf 12 -b:v 500K output.webm
-crf
values can go from 4 to 63. Lower values mean better quality.-b:v
is the maximum allowed bitrate. Higher means better quality.
#!/bin/sh /etc/rc.common | |
START=90 | |
H1='http://www.malwaredomainlist.com/hostslist/hosts.txt' | |
H2='http://winhelp2002.mvps.org/hosts.txt' | |
H3='http://sysctl.org/cameleon/hosts.win' | |
H4='http://pgl.yoyo.org/as/serverlist.php?hostformat=hosts&showintro=1&mimetype=plaintext' | |
alert('hello ' + document.location.href); |
Others have recently developed packages for this same functionality, and done it better than anything I could do. Use the packages instead of this script:
-
Gargoyle package by @lantis1008
-
OpenWRT package by @dibdot
In its basic usage, this script will modify the router such that blocked addresses are null routed and unreachable. Since the address blocklist is full of advertising, malware, and tracking servers, this setup is generally a good thing. In addition, the router will update the blocklist weekly. However, the blocking is leaky, so do not expect everything to be blocked.