I hereby claim:
- I am rmrfslashbin on github.
- I am rmrfslashbin (https://keybase.io/rmrfslashbin) on keybase.
- I have a public key ASCcgFp0cp9qksvUqIs9i9iaiMscJkzD-mRGYbeLpCHGiQo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
Sometimes /dev/urandom
sounds nice.
$ cat /dev/urandom | padsp tee /dev/audio > /dev/null
What about /boot
?
$ sudo cat /dev/nvme0n1p2 | padsp tee /dev/audio > /dev/null
These are some rough notes for deploying a test/dev local CA, a server key/cert, and a client key/cert. The intention is to provide a quick and dirty (don't use in production) local CA with one server and one client. HAProxy is used as an SSL terminator which forces SSL for all connections (via http redirect), then optionally accepts a client cert for authentication.
Follow the install guide for easy-rsa (https://github.com/OpenVPN/easy-rsa)
./easyrsa init-pki
./easyrsa build-ca
So you want to learn how to make a CA...
-extensions usr_cert
.Notes related to using public/private keys to encrypt data.
This section generates a new private key and extracts the public key.
openssl genpkey -algorithm RSA -out private_key.pem -pkeyopt rsa_keygen_bits:4096
openssl rsa -pubout -in private_key.pem -out public_key.pem
This is a very rough guide to deploying and updating MediaWiki on Heroku. Lots of assumptions are made. Be sure to keep your MediaWiki deployment up-to-date!
This recipe sets up FoxyProxy to route all traffic through a proxy EXCEPT blacklisted domain (they will go out directly).
This receipe assumes a fresh FoxyProxy install, one proxy for everthing, excluding defined domains.
Use proxies based on their pre-defined patterns and priorities
.#!/usr/bin/env python | |
import binascii | |
def getHex(string): | |
x = binascii.hexlify(string.encode()) | |
y = str(x,'ascii') | |
print("hex ", y) |
#!/usr/bin/env python3 | |
## | |
# This script walks block storage devices and locates | |
# EC2 instance stores. It then lables the disks as | |
# LMV2 physical volumes (PV), creates an LVM2 volume | |
# group (VG), then an LVM2 logical volume (LV) and | |
# finally formats the new LV as XFS. | |
## |