For excessively paranoid client authentication.
Updated Apr 5 2019:
because this is a gist from 2011 that people stumble into and maybe you should AES instead of 3DES in the year of our lord 2019.
some other notes:
| Π¨Π°Π³ β1 β ΠΡΠ΅ΡΠ΅ΠΊΠ²ΠΈΠ·ΠΈΡΡ. Π‘ΡΠ°Π²ΠΈΠΌ festival ΠΈ pjsip | |
| sudo aptitude install festival | |
| ΠΠ°Π³ΡΡΠΆΠ°Π΅ΠΌ ΠΈ ΡΠΎΠ±ΠΈΡΠ°Π΅ΠΌ pjsip: | |
| wget http://www.pjsip.org/release/1.10/pjproject-1.10.tar.bz2 | |
| tar xfv pjproject-1.10.tar.bz2 | |
| cd pjproject-1.10 | |
| ./configure --disable-sound |
| <?php | |
| use Doctrine\ORM\Query\SqlWalker; | |
| /** | |
| * Quick hack to allow adding a USE INDEX on the query | |
| */ | |
| class UseIndexWalker extends SqlWalker | |
| { | |
| const HINT_USE_INDEX = 'UseIndexWalker.UseIndex'; |
Locate the section for your github remote in the .git/config file. It looks like this:
[remote "origin"]
fetch = +refs/heads/*:refs/remotes/origin/*
url = [email protected]:joyent/node.git
Now add the line fetch = +refs/pull/*/head:refs/remotes/origin/pr/* to this section. Obviously, change the github url to match your project's URL. It ends up looking like this:
| π | π | π | π |
π© | π | π | π | π¨ | π° | π£ | π’ | π | π | π² | π± |
| π« | π | π‘ | π€ | πͺ | π | π·
π | π΅ | πΏ | π | π | πΆ | π | π½ | π | π | π | β€οΈ | π | π | π | π | π | π | π | β¨
| A collection of python & shell integration attempts: | |
| pysh:Write shell scripts in Python | |
| https://github.com/yunabe/pysh | |
| lshell:function limited shell | |
| https://github.com/ghantoos/lshell | |
| sh:similar to plumbum but has builtin features | |
| https://github.com/amoffat/sh |
Let's say you start a project locally, and do some editing.
$ mkdir -p ~/git/foo && cd ~/git/foo
$ touch NEWFILENow you decide you want to create a new github repo and track it, but the directory is non-empty so git won't let you clone into it. You can fix this, thusly:
| this is a sample of output: | |
| root@percona-db-2:~# iperf -s -u -B 226.94.1.1 -i 1 | |
| ------------------------------------------------------------ | |
| Server listening on UDP port 5001 | |
| Binding to local address 226.94.1.1 | |
| Joining multicast group 226.94.1.1 | |
| Receiving 1470 byte datagrams | |
| UDP buffer size: 122 KByte (default) | |
| ------------------------------------------------------------ |
| -- a quick LUA access script for nginx to check IP addresses against an | |
| -- `ip_blacklist` set in Redis, and if a match is found send a HTTP 403. | |
| -- | |
| -- allows for a common blacklist to be shared between a bunch of nginx | |
| -- web servers using a remote redis instance. lookups are cached for a | |
| -- configurable period of time. | |
| -- | |
| -- block an ip: | |
| -- redis-cli SADD ip_blacklist 10.1.1.1 | |
| -- remove an ip: |
| #!/bin/sh | |
| ISSUER_CER=$1 | |
| SERVER_CER=$2 | |
| URL=$(openssl x509 -noout -ocsp_uri -in "$SERVER_CER") | |
| openssl ocsp -noverify -no_nonce -respout ocsp.resp -issuer "$ISSUER_CER" -cert "$SERVER_CER" -url "$URL" | |
| # Where "ocsp.resp" is whatever file you have configured in Nginx for the "ssl_stapling_file". |