Including access list to prevent 2FA for specified IP ranges
- Securing SSH with two factor authentication using Google Authenticator
- How To Set Up Multi-Factor Authentication for SSH on Ubuntu 14.04
For Ubuntu:
import RPi.GPIO as GPIO | |
import datetime | |
def my_callback(channel): | |
if GPIO.input(channel) == GPIO.HIGH: | |
print('\n▼ at ' + str(datetime.datetime.now())) | |
else: | |
print('\n ▲ at ' + str(datetime.datetime.now())) | |
try: |
#!/bin/bash | |
# Get the number of rows available in the terminal | |
ROWS=$(tput lines) | |
# Generate your nmcli content | |
CONTENT=$(nmcli -f SSID,RATE,CHAN,SIGNAL,BARS dev wifi list | awk '!seen[$1]++') | |
# Check if the content exceeds the available rows | |
if [ $(echo "$CONTENT" | wc -l) -gt $ROWS ]; then |
nick@beepy:~ $ cat .tmux.conf | |
#set -g monitor-silence 5 | |
#set-hook alert-silence 'run-shell "echo hello"' | |
set-option -g status-interval 15 | |
set-option -g status-right "#(~/bin/wifi_status.sh) " | |
set-option -ag status-right "#(~/repos/beepy-battery/src/battery.sh ) " | |
set-option -ag status-right "#(vcgencmd measure_temp | cut -c6-9 )C" | |
from __future__ import print_function | |
import json | |
# Proof of concept AWS Transcribe Diarization Display | |
# Expects "asrOutput.json" to be in the same directory as thie file | |
# https://docs.aws.amazon.com/transcribe/latest/dg/how-it-works.html#how-diarization | |
with open('asrOutput.json', 'r') as f: | |
data = f.read() |
{ | |
"launches": [ | |
{ | |
"Test Launch 1": { | |
"Date": "Today", | |
"Type": "Falcon 9" | |
} | |
}, | |
{ | |
"Test Launch 2": { |
if [ -z "$1" ] | |
then | |
region_list=($(aws ec2 describe-regions --query 'Regions[].RegionName[]' --output text | gsed -e 'y/\t/\n/' | gsed '1!G;h;$!d')) | |
else | |
region_list=$1 | |
fi | |
clear | |
for i in "${region_list[@]}" |
package ca.uwo.csd.cs2212.USERNAME; | |
public class BankAccount { | |
private double balance; | |
public BankAccount(double balance) { | |
this.balance = balance; | |
} |
Including access list to prevent 2FA for specified IP ranges
For Ubuntu:
root@homelab:~# cat /etc/network/interfaces | |
auto lo | |
iface lo inet loopback | |
iface eth0 inet manual | |
iface eth1 inet manual | |
iface eth2 inet manual | |
iface eth3 inet manual | |
auto vmbr0 |