базовый адрес: https://goodgame.ru/api/4/
ниже идут найденные методом тыка эндпоинты
для некоторых приведены примеры запроса,
для остальных они не известны и приведены коды ответов для запросов без параметров
| ln -sf /usr/lib/x86_64-linux-gnu/libvolk.so.1.3.1 /usr/lib/x86_64-linux-gnu/libvolk.so.1.3 |
| // ==UserScript== | |
| // @name Hide unwanted streams on Twitch | |
| // @description Blocks content that you don't want to see on twitch.tv, such as channels, games, videos etc. | |
| // @namespace https://github.com/LinogeFly/hide-unwanted-streams-on-twitch | |
| // @version 1.3.29 | |
| // @author LinogeFly | |
| // @license MIT | |
| // @supportURL https://www.reddit.com/message/compose/?to=LinogeFly | |
| // @include http://*.twitch.tv/* | |
| // @include https://*.twitch.tv/* |
базовый адрес: https://goodgame.ru/api/4/
ниже идут найденные методом тыка эндпоинты
для некоторых приведены примеры запроса,
для остальных они не известны и приведены коды ответов для запросов без параметров
| """ssh-copy-id for Windows. | |
| Example usage: python ssh-copy-id.py ceilfors@my-remote-machine | |
| This script is dependent on msysgit by default as it requires scp and ssh. | |
| For convenience you can also try that comes http://bliker.github.io/cmder/. | |
| origin url: https://gist.github.com/ceilfors/fb6908dc8ac96e8fc983 | |
| """ | |
| import argparse, os | |
| from subprocess import call, PIPE |
| #!/bin/bash | |
| cat<<EOF>caconfig.cnf | |
| # My sample caconfig.cnf file. | |
| # | |
| # Default configuration to use when one is not provided on the command line. | |
| # | |
| [ ca ] | |
| default_ca = local_ca | |
| # |
| { | |
| "title": "Activity Monitor", | |
| "rules": [ | |
| { | |
| "description": "Command+Shift+Esc Opens Activity Monitor", | |
| "manipulators": [ | |
| { | |
| "type": "basic", | |
| "from": { | |
| "key_code": "escape", |
| #### server #### | |
| # apt update | |
| # apt install nfs-kernel-server | |
| # snap install --classic micro | |
| # ufw allow from <CLIENT_IP> to any port nfs | |
| # ufw allow from any to any port ssh | |
| # ufw enable | |
| mkdir /tmp/share | |
| chown nobody:nogroup /tmp/share | |
| micro /etc/exports |
simple udp proxy via nginx + docker-compose
| #!/Users/<username>/.local/share/virtualenvs/<folder>-<hash>/bin/python3 | |
| # -*- coding: utf-8 -*- | |
| import subprocess | |
| import os | |
| current_pid = os.getpid() | |
| s = subprocess.run('ps auxww | grep -F "/mypy" ', shell=True, stdout=subprocess.PIPE) | |
| lines = s.stdout.decode().strip().splitlines() |
docker windows bind: An attempt was made to access a socket in a way forbidden by its access permissions.
netsh int ipv4 show excludedportrange protocol=tcp
https://dandini.wordpress.com/2019/07/15/administered-port-exclusions-blocking-high-ports/