2017/08/09 MacOS
$ ls -al ~/.ssh
##Windows users:
cmder will be refered as console
##Mac Os, Ubuntu and windows users continue here:
homestead
utf8_general_ciIs that what God does? | |
He helps? | |
Tell me, | |
why didn't God help | |
my innocent friend | |
who died for no reason | |
while the guilty roam free? | |
Okay, fine. | |
Forget the one-offs. | |
How about the countless wars |
http://pwfisher.com/nucleus/index.php?itemid=45 | |
This command line option parser supports any combination of three types of options (switches, flags and arguments) and returns a simple array. | |
<?php | |
/** | |
* CommandLine class | |
* | |
* @package Framework | |
*/ | |
/** |
Putting cryptographic primitives together is a lot like putting a jigsaw puzzle together, where all the pieces are cut exactly the same way, but there is only one correct solution. Thankfully, there are some projects out there that are working hard to make sure developers are getting it right.
The following advice comes from years of research from leading security researchers, developers, and cryptographers. This Gist was [forked from Thomas Ptacek's Gist][1] to be more readable. Additions have been added from
#301 Redirects for .htaccess | |
#Redirect a single page: | |
Redirect 301 /pagename.php http://www.domain.com/pagename.html | |
#Redirect an entire site: | |
Redirect 301 / http://www.domain.com/ | |
#Redirect an entire site to a sub folder | |
Redirect 301 / http://www.domain.com/subfolder/ |
#301 Redirects for .htaccess | |
#Redirect a single page: | |
Redirect 301 /pagename.php http://www.domain.com/pagename.html | |
#Redirect an entire site: | |
Redirect 301 / http://www.domain.com/ | |
#Redirect an entire site to a sub folder | |
Redirect 301 / http://www.domain.com/subfolder/ |
1 - install GPG tools : https://gpgtools.org/
2 - Create new key for your github email
3 - Add key to git on your local machine: git config --global user.signingkey YOURKEY
4 - configure git to sign all commits: git config --global commit.gpgsign true
5 - add to the bottom of ~/.gnupg/gpg.conf
:
The purpose of this document is to make recommendations on how to browse in a privacy and security conscious manner. This information is compiled from a number of sources, which are referenced throughout the document, as well as my own experiences with the described technologies.
I welcome contributions and comments on the information contained. Please see the How to Contribute section for information on contributing your own knowledge.