Jon Warbrick, July 2014, V3.2 (for Ansible 1.7)
First one found from of
#!/usr/bin/ruby | |
# WANT_JSON | |
# | |
# osx_service - Ansible module to manage launchd services on Mac OS X | |
# | |
# | |
# The MIT License (MIT) | |
# | |
# Copyright (c) 2016 Björn Albers <[email protected]> | |
# |
import subprocess | |
get_line_by_line_texlive_dependencies = subprocess.run( | |
[ | |
"apt-cache", | |
"depends", | |
"texlive-full" | |
], | |
universal_newlines=True, | |
stdout=subprocess.PIPE |
# Add this snippet to the top of your playbook. | |
# It will install python2 if missing (but checks first so no expensive repeated apt updates) | |
# [email protected] | |
- hosts: all | |
gather_facts: False | |
tasks: | |
- name: install python 2 | |
raw: test -e /usr/bin/python || (apt -y update && apt install -y python-minimal) |
Jon Warbrick, July 2014, V3.2 (for Ansible 1.7)
First one found from of
variable "bucket_site" {} | |
variable "region" {} | |
variable "route53_domain_name" {} | |
variable "route53_domain_zoneid" {} | |
variable "route53_domain_alias_name" {} | |
variable "route53_domain_alias_zoneid" {} | |
provider "aws" { | |
region = "${var.region}" | |
} |
{ | |
"AWSEBDockerrunVersion": "1", | |
"Image": { | |
"Name": "<AWS_ACCOUNT_ID>.dkr.ecr.us-east-1.amazonaws.com/<NAME>:<TAG>", | |
"Update": "true" | |
}, | |
"Ports": [ | |
{ | |
"ContainerPort": "443" | |
} |
### | |
### | |
### UPDATE: For Win 11, I recommend using this tool in place of this script: | |
### https://christitus.com/windows-tool/ | |
### https://github.com/ChrisTitusTech/winutil | |
### https://www.youtube.com/watch?v=6UQZ5oQg8XA | |
### iwr -useb https://christitus.com/win | iex | |
### | |
### OR take a look at | |
### https://github.com/HotCakeX/Harden-Windows-Security |
This is a quick example showing how to use regexes to find tri-grams in Shakespeare...well, 570,872 of them, anyway, if we do some basic filtering of non-dialogue.
Though tokenization and n-grams should typically be done using a proper natural language processing framework, it's possible to do in a jiffy from the command-line, using standard Unix tools and ack, the better-than-grep utility.
If you have any sort of administrative interface on your web site, you can easily imagine an intruder gaining access and mucking about. How do you know the extent of the damage? Adding an audit log to your app is one quick solution. An audit log should record a few things:
Using the Rails framework, this is as simple as adding a before_action
to your admin controllers. Here’s a basic version that I’m using in production.
The Transmission torrent client has an option to set a Blocklist, which helps protect you from getting caught and having the DMCA send a letter/email.
It's as simple as downloading and installing the latest client: