For educational reasons I've decided to create my own CA. Here is what I learned.
Lets get some context first.
| .\" generated with Ronn/v0.7.3 | |
| .\" http://github.com/rtomayko/ronn/tree/0.7.3 | |
| . | |
| .TH "COOLER" "7" "February 2014" "" "" | |
| . | |
| .SH "NAME" | |
| \fBcooler\fR \- import and export homebrew settings | |
| . | |
| .SH "SYNOPSIS" | |
| \fBname import name_of_cooler_bundle\fR |
| bsd/dev/dtrace/dtrace.c:19734: if (!PE_parse_boot_argn("dtrace_dof_mode", &dtrace_dof_mode, sizeof (dtrace_dof_mode))) { | |
| bsd/dev/dtrace/dtrace.c:19764: if (!PE_parse_boot_argn("dtrace_kernel_symbol_mode", &dtrace_kernel_symbol_mode, sizeof (dtrace_kernel_symbol_mode))) { | |
| bsd/dev/dtrace/fbt.c:477: PE_parse_boot_argn("IgnoreFBTBlacklist", &gIgnoreFBTBlacklist, sizeof (gIgnoreFBTBlacklist)); | |
| bsd/dev/unix_startup.c:261: (void) PE_parse_boot_argn("ncl", &ncl, sizeof (ncl)); | |
| bsd/dev/unix_startup.c:262: (void) PE_parse_boot_argn("mbuf_pool", &mbuf_pool, sizeof (mbuf_pool)); | |
| bsd/kern/bsd_init.c:1113: if (PE_parse_boot_argn("-s", namep, sizeof (namep))) | |
| bsd/kern/bsd_init.c:1116: if (PE_parse_boot_argn("-b", namep, sizeof (namep))) | |
| bsd/kern/bsd_init.c:1119: if (PE_parse_boot_argn("-x", namep, sizeof (namep))) /* safe boot */ | |
| bsd/kern/bsd_init.c:1123: if (PE_parse_boot_argn("-vnode_cache_defeat", namep, sizeof (namep))) | |
| bsd/kern/bsd_init.c:1127: if (PE_parse_boot_argn("-disable_aslr", namep, sizeof (namep))) |
| # first: | |
| lsbom -f -l -s -pf /var/db/receipts/org.nodejs.pkg.bom | while read f; do sudo rm /usr/local/${f}; done | |
| sudo rm -rf /usr/local/lib/node /usr/local/lib/node_modules /var/db/receipts/org.nodejs.* | |
| # To recap, the best way (I've found) to completely uninstall node + npm is to do the following: | |
| # go to /usr/local/lib and delete any node and node_modules | |
| cd /usr/local/lib | |
| sudo rm -rf node* |
Exporting password + one-time code data from iCloud Keychain is now officially supported in macOS Monterey and Safari 15 (for Monterey, Big Sur, and Catalina). You can access it in the Password Manager’s “gear” icon (System Preferences > Passwords on Monterey, and Safari > Passwords everywhere else), or via the File > Export > Passwords... menu item). You shouldn't need to hack up your own exporter anymore.
After my dad died, I wanted to be able to have access any of his online accounts going forward. My dad was a Safari user and used iCloud Keychain to sync his credentials across his devices. I don’t want to have to keep an OS X user account around just to access his accounts, so I wanted to export his credentials to a portable file.
| #!/usr/bin/env bash | |
| ENV_PATH="$(dirname "$(dirname "$(which pip)")")" | |
| SYSTEM_VIRTUALENV="$(which -a virtualenv|tail -1)" | |
| BAD_ENV_PATHS="/usr/local" | |
| echo "Ensure the root of the broken virtualenv:" | |
| echo " $ENV_PATH" |
| # see https://www.topbug.net/blog/2013/04/14/install-and-use-gnu-command-line-tools-in-mac-os-x/ | |
| # core | |
| brew install coreutils | |
| # key commands | |
| brew install binutils | |
| brew install diffutils | |
| brew install ed --default-names | |
| brew install findutils --with-default-names |
No need for homebrew or anything like that. Works with https://www.git-tower.com and the command line.
gpg --list-secret-keys and look for sec, use the key ID for the next stepgit to use GPG -- replace the key with the one from gpg --list-secret-keys| #!/usr/bin/env zsh | |
| here=$0:A:h | |
| print_error () print -R $'\e[31m'"Error: $*"$'\e[0m' >&2 | |
| blacklist= | |
| print_number=0 | |
| while [[ $1 == -* ]]; do | |
| case $1 in |