Skip to content

Instantly share code, notes, and snippets.

View linuswillner's full-sized avatar

Linus Willner linuswillner

View GitHub Profile

Keybase proof

I hereby claim:

  • I am linuswillner on github.
  • I am linuswillner (https://keybase.io/linuswillner) on keybase.
  • I have a public key ASAhr-f3AlTRksBDK0-7cQZwsyUzVHM5OkFkTLmjBWgoDQo

To claim this, I am signing this object:

@linuswillner
linuswillner / install-neofetch-motd.sh
Created February 9, 2020 15:31
Add neofetch display to system login scripts
#!/bin/bash
sudo apt install neofetch
sudo cp motd.sh /etc/profile.d/motd.sh
sudo chmod +x /etc/profile.d/motd.sh
@linuswillner
linuswillner / math-notes-template.html
Last active April 29, 2020 14:46
A simple HTML template for making maths, physics etc. notes with support for ASCIIMath formatting
<!DOCTYPE html>
<head>
<meta charset="utf-8">
<meta content="IE=Edge" http-equiv="X-UA-Compatible">
<title>HTML Math Notes</title>
<meta name="viewport" content="width=device-width,initial-scale=1,maximum-scale=1,user-scalable=0">
</head>
<body>
<!-- Content goes here, example: -->
<h2>Welcome to HTML Math Notes!</h2>
@linuswillner
linuswillner / generate-vibrating-emoji.sh
Created May 8, 2020 21:48
Vibrating Discord emoji generator
#!/bin/bash
# Generate a vibrating Discord emoji from a PNG file
set -euo pipefail
# Number of frames of shaking
count=10
# Max pixels to move while shaking
delta=4
@linuswillner
linuswillner / settings.json
Created May 20, 2020 13:18
My Windows Terminal settings
// This file was initially generated by Windows Terminal 1.0.1401.0
// It should still be usable in newer versions, but newer versions might have additional
// settings, help text, or changes that you will not see unless you clear this file
// and let us generate a new one for you.
// To view the default settings, hold "alt" while clicking on the "Settings" button.
// For documentation on these settings, see: https://aka.ms/terminal-documentation
{
"$schema": "https://aka.ms/terminal-profiles-schema",
@linuswillner
linuswillner / tcd-psa-upwork-scams.md
Created July 18, 2020 14:12
Public service announcement from The Coding Den staff regarding Upwork account sharing scams on Discord

Public service announcement from The Coding Den staff regarding Upwork account sharing scams on Discord

Recently, we, members of staff in The Coding Den, have seen an upsurge in scamming attempts surrounding the freelancing platform Upwork. We want to issue this public service announcement with the intent of reaching as many people as possible, in order to help people stay safe and safeguarding them from potentially losing access to their accounts, or worse, becoming victims of identity theft.

The scammers seem to mainly be targeting programming communities in our experience, but we are not ruling out the possibility that they are targeting other types of communities too. This public service announcement represents what we have seen, and accordingly may use technical terminology for exemplification that may be beyond the comprehension of certain audiences. However, the general theme of the scams should be easy to digest regardless, and this announcement has been written

@linuswillner
linuswillner / psa.md
Last active May 30, 2022 01:43
Public service announcement from The Coding Den staff about social engineering being utilised as an attack vector for server takeovers

Today, on the 27th of March 2021, The Coding Den was subjected to a social engineering attack that lead to a brief hostile takeover of the server before the situation was brought under control by staff. We are sharing this statement as a public service announcement on the methodology used in the scam and possible remediations to prevent it, in order to help other staff teams avoid becoming victims of it.

Methodology

The attack proliferates as follows:

  1. The attacker will look for a staff member who is presently offline. This will ensure that it appears as if the staff member's account was globally banned and forcefully booted offline.
  2. It is within the attacker's interest to choose a target with the highest possible privileges (to do the maximum amount of damage), meaning that they will likely prefer administrators over moderators and so forth.
  3. The attacker will create a new Discord account with the same name and profile picture as the target.
  4. The attacker will approach a staff member, claiming