# set http proxy
export http_proxy=http://PROXYHOST:PROXYPORT
# set http proxy with user and password
export http_proxy=http://USERNAME:PASSWORD@PROXYHOST:PROXYPORT
# set http proxy with user and password (with special characters)
--- | |
- hosts: all | |
sudo: yes | |
tasks: | |
- name: Update packages list | |
apt: update_cache=yes | |
when: ansible_os_family == 'Debian' | |
- name: List packages to upgrade (1/2) |
# Install PIP | |
curl -LO https://bootstrap.pypa.io/get-pip.py | |
python get-pip.py --user | |
export PATH=$HOME/.local/bin:$PATH | |
# Install ansible | |
pip install ansible --user | |
# Run ansible | |
ansible --version |
No, seriously, don't. You're probably reading this because you've asked what VPN service to use, and this is the answer.
Note: The content in this post does not apply to using VPN for their intended purpose; that is, as a virtual private (internal) network. It only applies to using it as a glorified proxy, which is what every third-party "VPN provider" does.
(A Russian translation of this article can be found here, contributed by Timur Demin.)
Use memstick-licecd to install pfsense on your SSD.
- Initialize fstab:
[2.2.4-RELEASE][[email protected]]/root: /usr/local/sbin/ufslabels.sh
It may do nothing because all is already initialize but it's only in a case of
This is a guide that I wrote to improve the default security of my website https://fortran.io , which has a certificate from LetsEncrypt. I'm choosing to improve HTTPS security and transparency without consideration for legacy browser support.
WARNING: if you mess up settings, lose your certificates, or decide to no longer maintain HTTPS certs, these steps can and will make your domain inaccessible.
I would recommend these steps only if you have a specific need for information security, privacy, and trust with your users, and/or maintain a separate secure.example.com domain which won't mess up your main site. If you've been thinking about hosting a site on Tor, then this might be a good option, too.
The best resources that I've found for explaining these steps are https://https.cio.gov , https://certificate-transparency.org , and https://twitter.com/konklone
#!/bin/sh | |
git shortlog -sn | cut -f2 | sort --ignore-case > CONTRIBUTORS |
#!/bin/sh | |
# Alot of these configs have been taken from the various places | |
# on the web, most from here | |
# https://github.com/mathiasbynens/dotfiles/blob/master/.osx | |
# Set the colours you can use | |
black='\033[0;30m' | |
white='\033[0;37m' | |
red='\033[0;31m' |
#!/usr/bin/env php | |
<?php | |
/** | |
* Generates a naturally sortable UUID in a distributed environment. | |
* UUID's are 120-bit represented in base62 as 20 in length and are composed of: | |
* - a time stamp in microseconds (from 1970-01-01 until 3180-01-01; ~1,200 years if using a custom epoch) | |
* - the machine's MAC address | |
* - the running process' id | |
*/ | |
class UniqueId { |