I hereby claim:
- I am spawnrider on github.
- I am spawnrider (https://keybase.io/spawnrider) on keybase.
- I have a public key ASCSwFqHaw1H8Q0pbgwn_c5BICJzy6nDI7IdzQsc6TYQ3go
To claim this, I am signing this object:
| #include <b64.h> | |
| #include <HttpClient.h> | |
| #include <SPI.h> | |
| #include <Ethernet.h> | |
| #include <RCSwitch.h> | |
| #include <DHT.h> | |
| // To send RF commands | |
| RCSwitch mySwitch = RCSwitch(); |
| # Example Dockerfile | |
| FROM hello-world |
| # Exemples | |
| # Listing des utilisateurs dans C:\Users | |
| docker run --rm -v c:/Users:/data alpine ls /data | |
| # Pré-requis - Suppression de l'image locale | |
| docker rmi httpd | |
| # 1 - Récupération d'une image | |
| # Image Docker Apache HTTPD | |
| # https://hub.docker.com/_/httpd/ |
| # PSEXEC is a standalone executable file that allows you to run commands on remote machines. | |
| # You can download the tool from here: | |
| # http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx | |
| # Open a command line and type the follwoing: | |
| psexec \\machinename reg add "hklm\system\currentcontrolset\control\terminal server" /f /v fDenyTSConnections /t REG_DWORD /d 0 | |
| psexec \\remotecomputername netsh firewall set service remoteadmin enable | |
| psexec \\remotecomputername netsh firewall set service remotedesktop enable |
I hereby claim:
To claim this, I am signing this object:
| /*--- waitForKeyElements(): A utility function, for Greasemonkey scripts, | |
| that detects and handles AJAXed content. | |
| Usage example: | |
| waitForKeyElements ("div.comments", commentCallbackFunction); | |
| //--- Page-specific function to do what we want when the node is found. | |
| function commentCallbackFunction (jNode) { | |
| jNode.text ("This comment changed by waitForKeyElements()."); | |
| } |
| import { defineEndpoint } from '@directus/extensions-sdk'; | |
| import * as fs from 'fs'; | |
| import * as path from 'path'; | |
| import { spawn } from 'child_process'; | |
| import busboy from 'busboy'; | |
| export default defineEndpoint((router) => { |
This minimalist post is about creating a private key and a certificate signing request (CSR) for a SAN SSL certificate using OpenSSL. These commands was tested on the Mac OS command line using iTerm 2.
Run the following command for generating the private key :
openssl genrsa -out acme.com.key 2048
| version: '3.9' | |
| services: | |
| database: | |
| container_name: database | |
| image: postgis/postgis:13-master | |
| volumes: | |
| - ./data/database:/var/lib/postgresql/data | |
| networks: | |
| - directus |
| Param( | |
| [Parameter(Mandatory)] | |
| [string]$sourceKvName, | |
| [Parameter(Mandatory)] | |
| [string]$destKvName | |
| ) | |
| Connect-AzAccount | |
| $secretNames = (Get-AzKeyVaultSecret -VaultName $sourceKvName).Name | |
| $secretNames.foreach{ | |
| Set-AzKeyVaultSecret -VaultName $destKvName -Name $_ ` |