First Download the Android SDK Commandline Tool only.
https://developer.android.com/studio/
Goto Download Options
Find Commandline tools only Section
First Download the Android SDK Commandline Tool only.
https://developer.android.com/studio/
Goto Download Options
Find Commandline tools only Section
# import config. | |
# You can change the default config with `make cnf="config_special.env" build` | |
cnf ?= config.env | |
include $(cnf) | |
export $(shell sed 's/=.*//' $(cnf)) | |
# import deploy config | |
# You can change the default deploy config with `make cnf="deploy_special.env" release` | |
dpl ?= deploy.env | |
include $(dpl) |
Source: https://www.howtoforge.com/tutorial/passwordless-encryption-of-linux-root-partition/
The process of entering the passphrase at boot time will now be automated using an USB memory stick. Instead of using a passphrase , the secret key on the USB will decrypt the encrypted volumes. Connect an USB stick to the VM and locate it using the dmesg
command. It is detected as /dev/sdb
in my VM.
The secret key of 8192 random byte is extracted from the usb stick using the dd command.
dd if=/dev/sdb of=/root/secret.key bs=512 skip=4 count=16
You can unlock your rootfs on bootup from remote, using ssh to log in to the booting system while it's running with the initramfs mounted.
For remote unlocking to work, the following packages have to be installed before building the initramfs: dropbear
busybox
The file /etc/initramfs-tools/initramfs.conf
holds the configuration options used when building the initramfs. It should contain BUSYBOX=y
(this is set as the default when the busybox package is installed) to have busybox installed into the initramfs, and should not contain DROPBEAR=n, which would disable installation of dropbear to initramfs. If set to DROPBEAR=y, dropbear will be installed in any case; if DROPBEAR isn't set at all, then dropbear will only be installed in case of an existing cryptroot setup.
#!/usr/bin/env python3 | |
""" -*- coding: utf-8 -*- | |
Example Python3 Raise Exception without Traceback | |
Example Python3 Hide Traceback | |
Python3 Custom Exception Class | |
Python3 custom exception suppress traceback example | |
Python3 custom exception without traceback example | |
Example Python Raise Exception without Traceback | |
Example Python Hide Traceback | |
Python Custom Exception Class |
[2022-03-31 20:36:55.252 D] command line: '"I:\MO2\ModOrganizer.exe" ' | |
[2022-03-31 20:36:55.253 I] starting Mod Organizer version 2.4.4 revision 1df1ea5e in I:/MO2, usvfs: 0.5.6.0 | |
[2022-03-31 20:36:55.253 I] data path: I:/MO2 | |
[2022-03-31 20:36:55.253 I] working directory: I:/MO2 | |
[2022-03-31 20:36:55.253 D] timing: MOApplication setup() 0 ms | |
[2022-03-31 20:36:55.253 D] using ini at 'I:/MO2/ModOrganizer.ini' | |
[2022-03-31 20:36:55.253 D] timing: MOApplication::doOneRun() settings 0 ms | |
[2022-03-31 20:36:55.254 D] windows: version 10.0.19043, 19043.1586, release 21H1, 19041.1.amd64fre.vb_release.191206-1406, elevated: no | |
[2022-03-31 20:36:55.254 D] time zone: Eastern Daylight Time, -4:00 (dst is active, std is Eastern Standard Time, -5:00) | |
[2022-03-31 20:36:55.254 D] security products: |
[2022-03-31 20:43:26.289 D] command line: '"I:\MO2\ModOrganizer.exe" ' | |
[2022-03-31 20:43:26.295 I] starting Mod Organizer version 2.4.4 revision 1df1ea5e in I:/MO2, usvfs: 0.5.6.0 | |
[2022-03-31 20:43:26.295 I] data path: I:/MO2 | |
[2022-03-31 20:43:26.295 I] working directory: I:/MO2 | |
[2022-03-31 20:43:26.295 D] timing: MOApplication setup() 6 ms | |
[2022-03-31 20:43:26.296 D] using ini at 'I:/MO2/ModOrganizer.ini' | |
[2022-03-31 20:43:26.296 D] timing: MOApplication::doOneRun() settings 0 ms | |
[2022-03-31 20:43:26.296 D] windows: version 10.0.19043, 19043.1586, release 21H1, 19041.1.amd64fre.vb_release.191206-1406, elevated: no | |
[2022-03-31 20:43:26.296 D] time zone: Eastern Daylight Time, -4:00 (dst is active, std is Eastern Standard Time, -5:00) | |
[2022-03-31 20:43:26.296 D] security products: |
void BindCrtHandlesToStdHandles(bool bindStdIn, bool bindStdOut, bool bindStdErr) | |
{ | |
// Re-initialize the C runtime "FILE" handles with clean handles bound to "nul". We do this because it has been | |
// observed that the file number of our standard handle file objects can be assigned internally to a value of -2 | |
// when not bound to a valid target, which represents some kind of unknown internal invalid state. In this state our | |
// call to "_dup2" fails, as it specifically tests to ensure that the target file number isn't equal to this value | |
// before allowing the operation to continue. We can resolve this issue by first "re-opening" the target files to | |
// use the "nul" device, which will place them into a valid state, after which we can redirect them to our target | |
// using the "_dup2" function. | |
if (bindStdIn) |
// Used in https://github.com/SCP002/terminator. | |
package main | |
import ( | |
"errors" | |
"os" | |
"golang.org/x/sys/windows" | |
) |