From:
- http://www.hifi-remote.com/forums/viewtopic.php?t=14120
- http://www.remotecentral.com/cgi-bin/mboard/rc-discrete/thread.cgi?7852
Code:
Protocol: NEC1
Device: 2
SubDevice: 160
Func. OBC HEX EFC
From:
Code:
Protocol: NEC1
Device: 2
SubDevice: 160
Func. OBC HEX EFC
You can use ssacli
(smart storage administrator command line interface) tool to manage any of supported HP Smart Array Controllers in your Proxmox host without need to reboot your server to access Smart Storage Administrator in BIOS. That means no host downtime when managing your storage.
CLI is not as convenient as GUI interface provided by BIOS or desktop utilities, but still allows you to fully manage your controller, physical disks and logical drives on the fly with no Proxmox host downtime.
ssacli
replaces older hpssacli
, but shares the same syntax and adds support for newer servers and controllers.
Here we create the master key. We want only Certify
capability: we use the master key only to create the subkeys, Sign - Encrypt - Authenticate
capabilities will be assigned to the subkeys.
Run the following command to start the master key generation process. Select the set your own capabilities
creation process (type 8
)
▶ gpg --full-generate-key --expert
gpg (GnuPG) 2.2.9; Copyright (C) 2018 Free Software Foundation, Inc.
:local apiPrefix "https://uablacklist.net/subnets_mikrotik_" | |
:local tempFile "uablacklist.txt" | |
:local listName "uablacklist" | |
/log info "removing existing '$listName'..." | |
:put "removing existing '$listName'..." | |
/ip firewall address-list remove [/ip firewall address-list find list=$listName] | |
# mikrotik can't load >4KB file inside a variable, so backend contains file pieces which we download and parse one by one | |
:local i 0 |
var crypto = require('crypto'); | |
/* | |
msg_key_large = SHA256 (substr (auth_key, 88+x, 32) + plaintext + random_padding); | |
msg_key = substr (msg_key_large, 8, 16); | |
sha256_a = SHA256 (msg_key + substr (auth_key, x, 36)); | |
sha256_b = SHA256 (substr (auth_key, 40+x, 36) + msg_key); | |
aes_key = substr (sha256_a, 0, 8) + substr (sha256_b, 8, 16) + substr (sha256_a, 24, 8); | |
aes_iv = substr (sha256_b, 0, 8) + substr (sha256_a, 8, 16) + substr (sha256_b, 24, 8); | |
*/ |
import React, { Component } from 'react'; | |
import ReactTable, { ReactTableDefaults } from 'react-table'; | |
//https://github.com/tannerlinsley/react-table | |
//https://react-table.js.org/ | |
import 'react-table/react-table.css' | |
Object.assign(ReactTableDefaults, { | |
defaultPageSize: 10, | |
minRows: 3, | |
}); |
Lately I've been using Mikrotik routers because they're cheap, powerful, and fast. Most of them have either a USB or MicroSD slot, so you can add enough space to store network boot images right on the router.
I got most of the tips needed from these two articles, and combined them into this step by step guide:
'use strict'; | |
var fs = require('fs') | |
var args = process.argv.slice(2); | |
// From https://github.com/lodash/lodash/blob/4.17.4/lodash.js#L6891 | |
function compact(array) { | |
var index = -1, | |
length = array == null ? 0 : array.length, |
using Org.BouncyCastle.Asn1.Pkcs; | |
using Org.BouncyCastle.Asn1.Sec; | |
using Org.BouncyCastle.Asn1.X509; | |
using Org.BouncyCastle.Asn1.X9; | |
using Org.BouncyCastle.Crypto; | |
using Org.BouncyCastle.Crypto.Generators; | |
using Org.BouncyCastle.Crypto.Operators; | |
using Org.BouncyCastle.Crypto.Parameters; | |
using Org.BouncyCastle.Math; | |
using Org.BouncyCastle.Security; |
You can now read this on my (pretty) website! Check it out here.
Every reason to get more HackerPoints™ is a good one, so today we're going to
write a neat command line app in .NET Core! The Common library has a really cool
package Microsoft.Extensions.CommandlineUtils
to help us parse command line
arguments and structure our app, but sadly it's undocumented.
No more! In this guide, we'll explore the package and write a really neat