##Here we'll set the brightness level at startup
Use xbacklight
utility.
- In debian/ubuntu find startup applications portal
- Add command
xbacklight -set 30
import boto | |
import sys, traceback | |
r53conn = boto.connect_route53(aws_access_key_id="xxxxxxxxxxxxxx",aws_secret_access_key="yyyyyyyyyy") | |
recordSets = r53conn.get_zone("yourdomain.in") | |
try: | |
recordSets.add_cname(rSet[0],rSet[1]) | |
except Exception, e: | |
print "======" | |
print rSet[0] + " wasn't added to route53" |
import boto | |
r53conn = boto.connect_route53(aws_access_key_id="xxxxxxxxxxxxxx",aws_secret_access_key="yyyyyyyyyy") | |
recordSets = r53conn.get_zone("yourdomain.in") | |
#Sorry for the hacky way.....! | |
for recordset in recordSets.get_records(): | |
print recordset.name + " : " + recordset.to_print() |
def checkifDnsRecordExist(domain_name,dns_record): | |
''' | |
(str, str) --> (str) | |
Read your domain-name and dns_record and check if it exists or not | |
Returns recordSet and it's value in return | |
#If record exist | |
>>> checkifDnsRecordExist("domain_name.com", "mail.domain_name.com") | |
mail.domain_name.com : 5.3.5.3 |
##Here we'll set the brightness level at startup
Use xbacklight
utility.
xbacklight -set 30
In order to install it: pip.exe install elementtree --allow-unverified elementtree
( i don't why --allow-unverified elementtree)
example :
Inorder to list your application in overview.
/usr/share/applications
/usr/share/applications
directory so that it is accessible by everyone, or ~/.local/share/applications
if you only wish to make it accessible to a single user. Which is used should depend on whether your application is installed systemwide or into a user's home directory.Reference: https://developer.gnome.org/integration-guide/stable/desktop-files.html.en
# List the Windows disks | |
# Create a hash table that maps each device to a SCSI target | |
$Map = @{"0" = '/dev/sda1'} | |
for($x = 1; $x -le 26; $x++) {$Map.add($x.ToString(), [String]::Format("xvd{0}",[char](97 + $x)))} | |
for($x = 78; $x -le 102; $x++) {$Map.add($x.ToString(), [String]::Format("xvdc{0}",[char](19 + $x)))} | |
Try { | |
# Use the metadata service to discover which instance the script is running on | |
$InstanceId = (Invoke-WebRequest '169.254.169.254/latest/meta-data/instance-id').Content |
import boto | |
import sys, traceback | |
import os | |
print "=== Instance without terminate protection==============" | |
conn = boto.connect_ec2(aws_access_key_id='<aws access key>',aws_secret_access_key='<aws secret key>') | |
instances = conn.get_only_instances() | |
for instance in instances: | |
attrib = instance.get_attribute("disableApiTermination") |
# Find the IAM username belonging to the TARGET_ACCESS_KEY | |
# Useful for finding IAM user corresponding to a compromised AWS credential | |
# Requirements: | |
# | |
# Environmental variables: | |
# AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY | |
# python: | |
# boto |
set list
Shows invisible characters.set listchars
What invisibile characters should be set to, see :h listchars
for complete list.map
creates a key map that works in normal, visual, select and operator pending modesmap!
creates a key map that works in insert and command-line mode.