Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
/* ~/Library/KeyBindings/DefaultKeyBinding.Dict | |
This file remaps the key bindings of a single user on Mac OS X 10.5 to more | |
closely match default behavior on Windows systems. This makes the Command key | |
behave like Windows Control key. To use Control instead of Command, either swap | |
Control and Command in Apple->System Preferences->Keyboard->Modifier Keys... | |
or replace @ with ^ in this file. | |
Here is a rough cheatsheet for syntax. | |
Key Modifiers |
@startuml | |
' uncomment the line below if you're using computer with a retina display | |
' skinparam dpi 300 | |
!define Table(name,desc) class name as "desc" << (T,#FFAAAA) >> | |
' we use bold for primary key | |
' green color for unique | |
' and underscore for not_null | |
!define primary_key(x) <b>x</b> | |
!define unique(x) <color:green>x</color> | |
!define not_null(x) <u>x</u> |
# curl -s -o .editorconfig https://gist.githubusercontent.com/realmovestar/58eeaa8cfbe382b5f0b1d7338134eb5b/raw/cae4440cc24ac802c8e4bb2a27ab5d3ae34a79ce/.editorconfig | |
root = true | |
[*] | |
charset = utf-8 | |
end_of_line = lf | |
indent_style = space | |
insert_final_newline = true | |
tab_width = 4 | |
trim_trailing_whitespace = true |
# https://askubuntu.com/a/991286/320092 | |
git clone https://github.com/patjak/bcwc_pcie.git | |
cd bcwc_pcie | |
rm -rf firmware | |
git clone https://github.com/patjak/facetimehd-firmware.git firmware | |
cd firmware/ | |
make | |
sudo make install | |
cd .. | |
make |
I recently got myself a Yubikey and wanted to set up the Yubico Authenticator with all the OTPs I had in Google Authenticator. Unfortunately Yubico Authenticator doesn't support scanning the QR-code that the Google Authenticator generates when you export the OTP-keys, and it seemed like quite the daunting task to log in to every service to generate new OTP-keys. So I decided to have a look at the contents of the QR code, to see if I could import the keys into Yubico Authenticator in one go. Luckily I found a blog post by Alex Bakker that describes the data format.
Unfortunately, but likely for the best, the security policy of Google Authenticator won't allow you to take a screenshot of