755- Owner: Everything, Group: Read+Execute, World: Read+Execute644- Owner: Read+Write, Group: Read, World: Read
Octal Value
File Permissions Set
Permissions Description
755 - Owner: Everything, Group: Read+Execute, World: Read+Execute644 - Owner: Read+Write, Group: Read, World: ReadOctal Value
File Permissions Set
Permissions Description
rm -fr .cargo
sudo rm -fr .gomodcache
find packages/ -name '*.tar.gz' -delete
find packages/ -name '*.rpm' -delete
cargo make cleanYou may also want to nuke docker from orbit
| This guide assumes that you have already set up a Ubiquiti Unifi VPN following the guide: | |
| https://help.ubnt.com/hc/en-us/articles/115005445768-UniFi-L2TP-Remote-Access-VPN-with-USG-as-RADIUS-Server | |
| To configure a Linux machine to be able to connect remotely I followed these steps. This guide was written for Debian 8. | |
| - In Debian install the "xl2tpd" and "strongswan" packages. | |
| - Edit /etc/ipsec.conf to add the connection: | |
| conn YOURVPNCONNECTIONNAME |
Linux Paths
$HOME/.config/sublime-text/Packages/User/Default (Linux).sublime-keymap$HOME/.config/sublime-text/Packages/User/Preferences.sublime-settings$HOME/.config/sublime-text/Packages/User/Plain text.sublime-settingsPackage Settings:
$HOME/.config/sublime-text/Packages/User/Package Control.sublime-settings
| Key Name Resulting Keystroke | |
| {F1} - {F24} Function keys. For example: {F12} is the F12 key. | |
| {!} ! | |
| {#} # | |
| {+} + | |
| {^} ^ | |
| {{} { | |
| {}} } | |
| {Enter} ENTER key on the main keyboard | |
| {Escape} or {Esc} ESCAPE |
| use serde::ser::SerializeMap; | |
| use serde::{Serialize, Serializer, de::Visitor, de::MapAccess, Deserialize, Deserializer}; | |
| use std::fmt; | |
| #[derive(Debug)] | |
| struct Custom(String, u32); | |
| impl Serialize for Custom { | |
| fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error> | |
| where |
| // colored = "2" | |
| // chrono = "0" | |
| // env_logger = "0" | |
| // log = "0" | |
| use colored::*; | |
| use std::io::Write; | |
| fn init_logger(default_level: LevelFilter) { | |
| // extract the value of RUST_LOG if it exists |