ssh x1
lxc profile device remove default root
lxc profile device remove default eth0
lxc storage delete local
lxc config unset core.https_address
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
systemctl disable wg-quick@wg0 | |
systemctl stop wg-quick@wg0 | |
PRIVATEKEY=$(wg genkey) | |
CONFIGFILE="/etc/wireguard/wg0.conf" | |
echo "[Interface]" > $CONFIGFILE | |
echo "PrivateKey = ${PRIVATEKEY}" >> $CONFIGFILE |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <stdio.h> | |
#include <stdlib.h> | |
#include <string.h> | |
#include <errno.h> | |
#include <json-c/json.h> | |
#include <wsclient/wsclient.h> | |
int onclose(wsclient *c) { | |
fprintf(stderr, "onclose called: %d\n", c->sockfd); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
mkdir -p /mnt/linux | |
mount /dev/local/linux /mnt/linux | |
mount /dev/sda1 /mnt/linux/boot | |
mount -t proc none /mnt/linux/proc | |
mount -o bind /dev /mnt/linux/dev | |
mount -o bind /sys /mnt/linux/sys | |
mount -t devpts devpts /mnt/linux/dev/pts |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import requests | |
import json | |
# SDK: https://binance-docs.github.io/apidocs/futures/en/#sdk-and-code-demonstration | |
# The base endpoint is: https://fapi.binance.com | |
res = requests.get('https://fapi.binance.com/fapi/v1/exchangeInfo') | |
print(res) | |
response = json.loads(res.text) | |
print(response) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// contracts/Valoriza.sol | |
// SPDX-License-Identifier: MIT | |
pragma solidity ^0.8.0; | |
import "https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/contracts/access/AccessControl.sol"; | |
import "https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/contracts/token/ERC20/ERC20.sol"; | |
import "https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/contracts/utils/math/SafeMath.sol"; | |
contract Valoriza is ERC20, AccessControl { | |
using SafeMath for uint256; |
This tutorial is going to show you how to set up your own WireGuard VPN server on CentOS. WireGuard is made specifically for the Linux kernel. It runs inside the Linux kernel and allows you to create fast, modern, and secure VPN tunnel. TL;DR
This tutorial assumes that the VPN server and VPN client are both running CentOS operating system.
Log into your CentOS server, then run the following commands to install WireGuard.
# CentOS 8
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
const fetch = require("node-fetch"); // "Fetch" HTTP req library | |
const finex = require("./finex"); | |
let params = { | |
sku: 'start', | |
symbol: "tBTCUSD", | |
type: "LIMIT", | |
// target: 25500, | |
limit: 100, | |
// amount: 0.002, //0.0052, //200 |
!w ==> wallets
!o ==> orders
!p ==> positions
!s ==> setPosition {AMOUNT}( NEGATIVE IF SELL ) {SYMBOL}
!h ==> help