# set http proxy
export http_proxy=http://PROXYHOST:PROXYPORT
# set http proxy with user and password
export http_proxy=http://USERNAME:PASSWORD@PROXYHOST:PROXYPORT
# set http proxy with user and password (with special characters)| --- | |
| - hosts: all | |
| sudo: yes | |
| tasks: | |
| - name: Update packages list | |
| apt: update_cache=yes | |
| when: ansible_os_family == 'Debian' | |
| - name: List packages to upgrade (1/2) |
| # Install PIP | |
| curl -LO https://bootstrap.pypa.io/get-pip.py | |
| python get-pip.py --user | |
| export PATH=$HOME/.local/bin:$PATH | |
| # Install ansible | |
| pip install ansible --user | |
| # Run ansible | |
| ansible --version |
No, seriously, don't. You're probably reading this because you've asked what VPN service to use, and this is the answer.
Note: The content in this post does not apply to using VPN for their intended purpose; that is, as a virtual private (internal) network. It only applies to using it as a glorified proxy, which is what every third-party "VPN provider" does.
(A Russian translation of this article can be found here, contributed by Timur Demin.)
Use memstick-licecd to install pfsense on your SSD.
- Initialize fstab:
[2.2.4-RELEASE][[email protected]]/root: /usr/local/sbin/ufslabels.shIt may do nothing because all is already initialize but it's only in a case of
This is a guide that I wrote to improve the default security of my website https://fortran.io , which has a certificate from LetsEncrypt. I'm choosing to improve HTTPS security and transparency without consideration for legacy browser support.
WARNING: if you mess up settings, lose your certificates, or decide to no longer maintain HTTPS certs, these steps can and will make your domain inaccessible.
I would recommend these steps only if you have a specific need for information security, privacy, and trust with your users, and/or maintain a separate secure.example.com domain which won't mess up your main site. If you've been thinking about hosting a site on Tor, then this might be a good option, too.
The best resources that I've found for explaining these steps are https://https.cio.gov , https://certificate-transparency.org , and https://twitter.com/konklone
| #!/bin/sh | |
| git shortlog -sn | cut -f2 | sort --ignore-case > CONTRIBUTORS |
| #!/bin/sh | |
| # Alot of these configs have been taken from the various places | |
| # on the web, most from here | |
| # https://github.com/mathiasbynens/dotfiles/blob/master/.osx | |
| # Set the colours you can use | |
| black='\033[0;30m' | |
| white='\033[0;37m' | |
| red='\033[0;31m' |
| #!/usr/bin/env php | |
| <?php | |
| /** | |
| * Generates a naturally sortable UUID in a distributed environment. | |
| * UUID's are 120-bit represented in base62 as 20 in length and are composed of: | |
| * - a time stamp in microseconds (from 1970-01-01 until 3180-01-01; ~1,200 years if using a custom epoch) | |
| * - the machine's MAC address | |
| * - the running process' id | |
| */ | |
| class UniqueId { |