This steps will be execute on the Master Node if not otherwise mentioned.
- Disable swap
sudo swapoff -a
This guide is base on https://www.youtube.com/watch?v=vyBP7wpN72c.
I used a debian system setup with sudo.
For all steps you need root user priveleges, change to root user (use the matching):
sudo su -
su -
import requests | |
import os | |
from urllib.parse import urlparse, parse_qs | |
import subprocess | |
# Sets daily wallpaper from BING | |
bing_url = 'https://www.bing.com/HPImageArchive.aspx?format=js&idx=0&n=1' | |
user_home = os.getenv("HOME") | |
bingbong_download_folder = f'{user_home}/BingBong' |
#!/bin/zsh | |
ocrkit=/Applications/OCRKit.app/Contents/MacOS/OCRKit | |
filename=$(basename -- "$1") | |
new="/Users/YOURUSER/Scans/OCR/$filename" | |
$ocrkit --lang de --format pdf --no-progress --output "$new" "$1" | |
if [ $? -eq 0 ]; then | |
echo "OK" | |
echo "Remove $1" | |
rm "$1" | |
else |
#!/bin/bash | |
if grep Font "$1" | |
then | |
exit 0 | |
else | |
exit 1 | |
fi |
# A bash script to update a Cloudflare DNS A record with the external IP of the source machine | |
# Used to provide DDNS service for my home | |
# Needs the DNS record pre-creating on Cloudflare | |
# Proxy - uncomment and provide details if using a proxy | |
#export https_proxy=http://<proxyuser>:<proxypassword>@<proxyip>:<proxyport> | |
# Cloudflare zone is the zone which holds the record | |
zone=example.com | |
# dnsrecord is the A record which will be updated |
#!/bin/bash | |
# | |
######### UNRAID Nextcloud Backup Script ######### | |
# | |
#Created for Nextcloud Linuxserver.io Container | |
# | |
#Update the params to meet your requirements | |
# | |
################################################## |
By default Microsoft active directory servers will offer LDAP connections over unencrypted connections (boo!).
The steps below will create a new self signed certificate appropriate for use with and thus enabling LDAPS for an AD server. Of course the "self-signed" portion of this guide can be swapped out with a real vendor purchased certificate if required.
Steps have been tested successfully with Windows Server 2012R2, but should work with Windows Server 2008 without modification. Will require both a system with OpenSSL (ideally Linux/OSX) and (obviously) a Windows Active Directory server.