start new:
tmux
start new with session name:
tmux new -s myname
https://techcommunity.microsoft.com/t5/iis-support-blog/disable-client-certificate-revocation-crl-check-on-iis/ba-p/377134 | |
C:\Users\Administrator>netsh http show sslcert | |
SSL 证书绑定: | |
------------------------- | |
IP:端口 : 0.0.0.0:8088 | |
证书哈希 : 051103df1950988a8643134f68d9beaf9d149xxx | |
应用程序 ID : {4dc3e181-e14b-4a21-b022-59fc669b0xxx} |
#!/usr/bin/env bash | |
# To fix the " gpg: WARNING: unsafe permissions on homedir '/home/path/to/user/.gnupg' " error | |
# Make sure that the .gnupg directory and its contents is accessibile by your user. | |
chown -R $(whoami) ~/.gnupg/ | |
# Also correct the permissions and access rights on the directory | |
chmod 600 ~/.gnupg/* | |
chmod 700 ~/.gnupg |
$ cargo install cargo-edit cargo-expand cargo-audit
This is a technique for extracting all imported modules from a packaged Python application as .pyc
files, then decompiling them. The target program needs to be run from scratch, but no debugging symbols are necessary (assuming an unmodified build of Python is being used).
This was originally performed on 64-bit Linux with a Python 3.6 target. The Python scripts have since been updated to handle pyc files for Python 2.7 - 3.9.
In Python we can leverage the fact that any module import involving a .py*
file will eventually arrive as ready-to-execute Python code object at this function:
PyObject* PyEval_EvalCode(PyObject *co, PyObject *globals, PyObject *locals);
// import tls "github.com/refraction-networking/utls" | |
tcpConn, err := net.Dial("tcp", "tlsfingerprint.io:443") | |
if err != nil { | |
fmt.Printf("net.Dial() failed: %+v\n", err) | |
return | |
} | |
config := tls.Config{ServerName: "tlsfingerprint.io"} | |
tlsConn := tls.Client(tcpConn, &tlsConfig, utls.HelloCustom) | |
clientHelloSpec := tls.ClientHelloSpec { |
双十一,剁手入手某电视,“根据xxx法规,禁止安装该软件...”,开机有广告, | |
凭经验,智能设备一般情况下都有“后门”, | |
系统设置,没发现有adb选选项, | |
In Alpine linux, use bash shell | |
boost | |
bash bootstrap.sh | |
./b2 --stagedir=/home/wong/boost-stage architecture=x86 address-model=64 toolset=gcc variant=release link=static threading=multi --with-system --with-date_time --with-program_options stage |
public static class EnumExtensions | |
{ | |
/// <summary> | |
/// Gets all items for an enum value. | |
/// </summary> | |
/// <typeparam name="T"></typeparam> | |
/// <param name="value">The value.</param> | |
/// <returns></returns> | |
public static IEnumerable<T> GetAllItems<T>(this Enum value) | |
{ |
#!/bin/sh | |
# You could also use a script as your XferCommand | |
# in pacman.conf: XferCommand = /usr/local/bin/pacman-downloadhelper.sh %o %u | |
# usage: pacman-downloadhelper %o %u | |
outfile=$1 | |
url=$2 | |
# print debug output for the xfercommand | |
set -x |