- Make an install directory somewhere convenient and switch to it
mkdir -p ~/.local/share/authy
cd ~/.local/share/authy
- Fetch the current Authy snap
mkdir -p ~/.local/share/authy
cd ~/.local/share/authy
There is an increasing count of applications which use Authy for two-factor authentication. However many users who aren't using Authy, have their own authenticator setup up already and do not wish to use two applications for generating passwords.
Since I use 1Password for all of my password storing/generating needs, I was looking for a solution to use Authy passwords on that. I couldn't find any completely working solutions, however I stumbled upon a gist by Brian Hartvigsen. His post had a neat code with it to generate QR codes for you to use on your favorite authenticator.
His method is to extract the secret keys using Authy's Google Chrome app via Developer Tools. If this was not possible, I guess people would be reverse engineering the Android app or something like that. But when I tried that code, nothing appeared on the screen. My guess is that Brian used the
| # Expires: 5 minutes | |
| # License: See source for license and credits | |
| nano-tiny-noopvast-2.0 text/xml | |
| <VAST version="2.0"></VAST> | |
| disable-webassembly.js application/javascript | |
| (function() { | |
| delete WebAssembly; | |
| console.log('CV SAYS: WebAssembly deleted') |
| Ansible playbook to setup HTTPS using Let's encrypt on nginx. | |
| The Ansible playbook installs everything needed to serve static files from a nginx server over HTTPS. | |
| The server pass A rating on [SSL Labs](https://www.ssllabs.com/). | |
| To use: | |
| 1. Install [Ansible](https://www.ansible.com/) | |
| 2. Setup an Ubuntu 16.04 server accessible over ssh | |
| 3. Create `/etc/ansible/hosts` according to template below and change example.com to your domain | |
| 4. Copy the rest of the files to an empty directory (`playbook.yml` in the root of that folder and the rest in the `templates` subfolder) |
| package main | |
| import ( | |
| "crypto/tls" | |
| "golang.org/x/crypto/acme/autocert" | |
| "log" | |
| "net" | |
| "net/http" | |
| ) |
A curated list of AWS resources to prepare for the AWS Certifications
A curated list of awesome AWS resources you need to prepare for the all 5 AWS Certifications. This gist will include: open source repos, blogs & blogposts, ebooks, PDF, whitepapers, video courses, free lecture, slides, sample test and many other resources.
Index:
| export RUBY_HEAP_MIN_SLOTS=1000000 | |
| export RUBY_HEAP_SLOTS_INCREMENT=1000000 | |
| export RUBY_HEAP_SLOTS_GROWTH_FACTOR=1 | |
| export RUBY_GC_MALLOC_LIMIT=1000000000 | |
| export RUBY_HEAP_FREE_MIN=500000 | |
| # in .bashrc: | |
| # | |
| # if [ -f ~/.rubyconfig ] ; then | |
| # . ~/.rubyconfig |
| require 'fileutils' | |
| start_time = Time.now | |
| SOURCE_DB = { | |
| :name => 'db_name', | |
| :user => 'db_user', | |
| :password => 'db_pass', | |
| :host => 'localhost' |
| def extract_model_name(controller_class); controller_class.to_s.match(/(.+)Controller/)[1]; end | |
| def model(controller_class); extract_model_name(controller_class).singularize.constantize; end | |
| def symbol_for_model(controller_class, options = {}) | |
| tablename = extract_model_name(controller_class).tableize | |
| options[:pluralize] ? tablename.to_sym : tablename.singularize.to_sym | |
| end | |
| describe "an ordinary 'show' action", :shared => true do |