Skip to content

Instantly share code, notes, and snippets.

View kristapsk's full-sized avatar

Kristaps Kaupe kristapsk

View GitHub Profile
@kristapsk
kristapsk / date_loop.sh
Created March 14, 2016 14:45
Bash date loop
#! /bin/bash
date_start="2015-01-01"
date_end="2015-12-31"
date_start_unixtime="`date --date="$date_start" +"%s"`"
date_end_unixtime="`date --date="$date_end" +"%s"`"
date_current=$date_start
date_current_unixtime=$date_start_unixtime
#! /bin/bash
#
# backup_redmine.sh
# modified by ronan@lespolypodes.com
# Inspiration: https://gist.github.com/gabrielkfr/6432185
#
# Distributed under terms of the MIT license.
# -- VARS
DAY=`date +"%Y%m%d"`

The binary on the website is capable only to decode encrypted data, not encode, and may contain trojan (seems like it doesn't, but don't believe me). The binary is signed with the valid (usual) key. All old versions are wiped, the repository is wiped too.


Assumption #1 The website is presumed hacked, the keys are presumed compromised. Please do not download or run it. And please don't switch to bitlocker.

Latest working version is 7.1a. Version 7.2 is a hoax

On the SourceForge, the keys were changed before any TrueCrypt files uploaded, but now they are deleted and the old keys got reverted back.

--- ../hhvm/hphp/runtime/ext/ext_network.cpp 2013-11-26 14:42:19.630297106 +0200
+++ ext_network.cpp 2013-11-26 15:40:24.176773807 +0200
@@ -100,28 +100,14 @@
IMPLEMENT_THREAD_LOCAL(ResolverInit, ResolverInit::s_res);
Variant f_gethostname() {
- struct addrinfo hints, *res;
- char h_name[NI_MAXHOST];
- int error;
- String canon_hname;