базовый адрес: https://goodgame.ru/api/4/
ниже идут найденные методом тыка эндпоинты
для некоторых приведены примеры запроса,
для остальных они не известны и приведены коды ответов для запросов без параметров
ln -sf /usr/lib/x86_64-linux-gnu/libvolk.so.1.3.1 /usr/lib/x86_64-linux-gnu/libvolk.so.1.3 |
// ==UserScript== | |
// @name Hide unwanted streams on Twitch | |
// @description Blocks content that you don't want to see on twitch.tv, such as channels, games, videos etc. | |
// @namespace https://github.com/LinogeFly/hide-unwanted-streams-on-twitch | |
// @version 1.3.29 | |
// @author LinogeFly | |
// @license MIT | |
// @supportURL https://www.reddit.com/message/compose/?to=LinogeFly | |
// @include http://*.twitch.tv/* | |
// @include https://*.twitch.tv/* |
базовый адрес: https://goodgame.ru/api/4/
ниже идут найденные методом тыка эндпоинты
для некоторых приведены примеры запроса,
для остальных они не известны и приведены коды ответов для запросов без параметров
"""ssh-copy-id for Windows. | |
Example usage: python ssh-copy-id.py ceilfors@my-remote-machine | |
This script is dependent on msysgit by default as it requires scp and ssh. | |
For convenience you can also try that comes http://bliker.github.io/cmder/. | |
origin url: https://gist.github.com/ceilfors/fb6908dc8ac96e8fc983 | |
""" | |
import argparse, os | |
from subprocess import call, PIPE |
#!/bin/bash | |
cat<<EOF>caconfig.cnf | |
# My sample caconfig.cnf file. | |
# | |
# Default configuration to use when one is not provided on the command line. | |
# | |
[ ca ] | |
default_ca = local_ca | |
# |
{ | |
"title": "Activity Monitor", | |
"rules": [ | |
{ | |
"description": "Command+Shift+Esc Opens Activity Monitor", | |
"manipulators": [ | |
{ | |
"type": "basic", | |
"from": { | |
"key_code": "escape", |
#### server #### | |
# apt update | |
# apt install nfs-kernel-server | |
# snap install --classic micro | |
# ufw allow from <CLIENT_IP> to any port nfs | |
# ufw allow from any to any port ssh | |
# ufw enable | |
mkdir /tmp/share | |
chown nobody:nogroup /tmp/share | |
micro /etc/exports |
simple udp proxy via nginx + docker-compose
#!/Users/<username>/.local/share/virtualenvs/<folder>-<hash>/bin/python3 | |
# -*- coding: utf-8 -*- | |
import subprocess | |
import os | |
current_pid = os.getpid() | |
s = subprocess.run('ps auxww | grep -F "/mypy" ', shell=True, stdout=subprocess.PIPE) | |
lines = s.stdout.decode().strip().splitlines() |
docker windows bind: An attempt was made to access a socket in a way forbidden by its access permissions.
netsh int ipv4 show excludedportrange protocol=tcp
https://dandini.wordpress.com/2019/07/15/administered-port-exclusions-blocking-high-ports/