Need to setup gpg-agent first, on OSX I use keychain (it also does ssh-agent)
$ brew info keychain
keychain: stable 2.8.5
User-friendly front-end to ssh-agent(1)
https://www.funtoo.org/Keychain
/usr/local/Cellar/keychain/2.8.5 (7 files, 108.5KB) *| ## get interface name (ovs_eth0 below) via ip link | |
| ip link add macvlan0 link ovs_eth0 type macvlan mode bridge | |
| ##192.168.4.204/30 (204-207) | |
| ip addr add 192.168.4.204/30 dev macvlan0 | |
| ip link set macvlan0 up | |
| ip route add 192.168.44.204/30 dev macvlan0 | |
| docker network create frontend |
| Originally from: http://erlang.org/pipermail/erlang-questions/2017-August/093170.html | |
| For a safe and fast Erlang SSL server, there's a few | |
| configuration values you might want by default: | |
| [{ciphers, CipherList}, % see below | |
| {honor_cipher_order, true}, % pick the server-defined order of ciphers | |
| {secure_renegotiate, true}, % prevent renegotiation hijacks | |
| {client_renegotiation, false}, % prevent clients DoSing w/ renegs | |
| {versions, ['tlsv1.2', 'tlsv1.1']}, % add tlsv1 if you must |
| #!/usr/bin/expect -f | |
| set spassword "" | |
| set vpassword "" | |
| set name "cache-pw" | |
| set timeout 300 | |
| eval spawn -noecho [lrange $argv 0 [llength $argv]] | |
| proc read_sudo_passwd {} { | |
| global spassword |
The idea is based on a gist by @jimbojsb.
You can use Pygments or Highlight.
brew install python
-- Firstly, remove PRIMARY KEY attribute of former PRIMARY KEY
ALTER TABLE <table_name> DROP CONSTRAINT <table_name>_pkey;-- Then change column name of your PRIMARY KEY and PRIMARY KEY candidates properly.
ALTER TABLE <table_name> RENAME COLUMN <primary_key_candidate> TO id;Every so often I have to restore my gpg keys and I'm never sure how best to do it. So, I've spent some time playing around with the various ways to export/import (backup/restore) keys.
cp ~/.gnupg/pubring.gpg /path/to/backups/
cp ~/.gnupg/secring.gpg /path/to/backups/
cp ~/.gnupg/trustdb.gpg /path/to/backups/