There seems to be so many libraries that detect secrets in code that I wanted to collate them.
Install duplicity and gnupg2
Configure yourself a GPG key to encrypt the data with. Note the key ID/hash to use in the duplicity-backup.service.
Remember to backup your private key separately so it is not lost when you need your backups, and so you can recover your files.
Create yourself a place to put your backups
This is a list of stages that I look to use in my integration pipelines for any project. This is a starting point for me, to remind me when starting a new project as to what to look to include. They are in rough order, starting from ones that are likely to be caught first to ones that are to be more complex to catch.
As is always the way with technology these stages do not have to be used exactly as directed here. They are a starting point so as not to overlook anything when starting a new project, and save me from doing a load of digging through old repositories.
I also find that considering these as early as possible means that you will have a better end product. So it's best to ensure you try to include as many as possible, but also not to put too much effort in to them.
This is still a work in progress and therefore incomplete.
| * { | |
| box-sizing: border-box; | |
| } | |
| html, body { | |
| height: 100%; | |
| padding: 0; | |
| margin: 0; | |
| } |
| $ apt-get install openjdk-8-jre | |
| $ wget https://dl.google.com/android/android-sdk_r24.4.1-linux.tgz | |
| $ tar xvf android-sdk_r24.4.1-linux.tgz | |
| $ cd android-sdk-linux/ | |
| $ tools/android list sdk --all --extended | |
| $ tools/android update sdk --all --no-ui --filter sys-img-x86_64-android-22,platform-tools,android-22,sysimg-22 # android 5.0.1 | |
| $ tools/android list targets | |
| $ tools/android create avd --name test --target 1 --abi default/x86_64 | |
| $ tools/android avd -list-avd # these bits don't work. Need tidying up. Trying to list available avds that you just created | |
| $ tools/android avd -u -list-avd |
This does assume you're looking specifically at headlines.
False positives possible.
Some keywords can be found in the Wikipedia Weasel Words list.
https://en.wikipedia.org/wiki/Wikipedia:Manual_of_Style/Words_to_watch
-
Place the
random-mac.servicefile in to/etc/systemd/system -
Update the file so that
wifidevicenameis your WiFi device name, such aswlan0orwlp1s0 -
Give it permissions:
chmod 644 chown root:root -
Finally run:
| # A really hacked down version of http://dev.deluge-torrent.org/wiki/Development/1.3/UIClient | |
| # Writen to hook in to a different, syncro, script | |
| from deluge.ui.client import client | |
| import json | |
| # Import reactor for our mainloop | |
| from twisted.internet import reactor | |
| d = client.connect() |
| #!/usr/bin/env python | |
| import os | |
| import hashlib | |
| import collections | |
| import argparse | |
| class File(object): | |
| def __init__(self, filepath): | |
| self.filepath = filepath |
| pip install requests requests_oauthlib |