I hereby claim:
- I am l2ol33rt on github.
- I am sarcasticadmin (https://keybase.io/sarcasticadmin) on keybase.
- I have a public key whose fingerprint is BBBA 6D31 E451 9326 518A 1493 8CC9 6E1E C9BA 9CEF
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
| #/bin/sh | |
| # Create partitions | |
| gpart destroy -F /dev/ada0 | |
| gpart create -s GPT /dev/ada0 | |
| gpart add -t efi -s 100M -a 1M -l EFI /dev/ada0 | |
| gpart add -t freebsd-swap -s 8G -a 1M -l freebsd-swap /dev/ada0 |
| from jinja2 import Environment, DictLoader | |
| template = """{% for key, value in _dict.iteritems() %} | |
| this is the {{ key }} whose value is {{ value }} | |
| {% endfor -%}""" | |
| j2_env = Environment(loader=DictLoader({'sample.txt': template}), | |
| trim_blocks=True) | |
| print j2_env.get_template('sample.txt').render(_dict={'linux': 4.4, |
| #!/usr/bin/env ruby | |
| require 'unix_crypt' | |
| require 'io/console' | |
| require 'optparse' | |
| ##### | |
| # | |
| # Script for generating a users password hash defaults to SHA512. Will prompt for password twice | |
| # to make sure that it has been entered correctly. | |
| # |
This config allows you to connect through jumphost1 to the instance behind-jumphost1. It establishes a control socket that is persistent for 10m after disconnecting. If you connect multiple times to behind-jumphost1 the existing TCP connection will be used for additional sessions.
For more information take a look at: http://en.wikibooks.org/wiki/OpenSSH/Cookbook/Proxies_and_Jump_Hosts
| Here is a sample of how I am currently dealing with users. | |
| Big thanks to uggedal! I used his user states as an example: https://github.com/uggedal/states | |
| ### | |
| # How to create password hashes | |
| ### | |
| python -c "import crypt; print crypt.crypt('password', '\$6\$SALTsalt\$')" | |
| ### |