For excessively paranoid client authentication.
Organization & Common Name: Some human identifier for this server CA.
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
| import cgi | |
| from google.appengine.api import mail | |
| from google.appengine.ext import deferred | |
| from ndb import model | |
| from tipfy.routing import url_for | |
| from tipfyext.ndb.mixins import DateMixin | |
| import os | |
| from flask import Flask, render_template, request | |
| import stripe | |
| stripe_keys = { | |
| 'secret_key': os.environ['SECRET_KEY'], | |
| 'publishable_key': os.environ['PUBLISHABLE_KEY'] | |
| } | |
| stripe.api_key = stripe_keys['secret_key'] |
| #!/bin/bash | |
| # References | |
| # http://www.computerhope.com/unix/nc.htm#03 | |
| # https://github.com/daniloegea/netcat | |
| # http://unix.stackexchange.com/questions/26715/how-can-i-communicate-with-a-unix-domain-socket-via-the-shell-on-debian-squeeze | |
| # http://unix.stackexchange.com/questions/33924/write-inside-a-socket-open-by-another-process-in-linux/33982#33982 | |
| # http://www.linuxjournal.com/content/more-using-bashs-built-devtcp-file-tcpip | |
| # http://www.dest-unreach.org/socat/ | |
| # http://stuff.mit.edu/afs/sipb/machine/penguin-lust/src/socat-1.7.1.2/EXAMPLES |
| #Create a Network Security Group | |
| New-AzureNetworkSecurityGroup -Name "DMZ_NSG" -Location Southeast Asia -Label "DMZ NSG SEVNET" | |
| #Add, Update Rules to a NSG | |
| Get-AzureNetworkSecurityGroup -Name "DMZ_NSG" | Set-AzureNetworkSecurityRule -Name RDPInternet-DMZ -Type Inbound -Priority 347 -Action Allow -SourceAddressPrefix 'INTERNET' -SourcePortRange '63389' -DestinationAddressPrefix '10.0.2.0/25' -DestinationPortRange '63389' -Protocol TCP | |
| #Delete a rule from NSG | |
| Get-AzureNetworkSecurityGroup -Name "DMZ_NSG" | Remove-AzureNetworkSecurityRule -Name RDPInternet-DMZ | |
| #Associate a NSG to a Virtual machine |
| #!/bin/bash | |
| # | |
| # Automatic update for made-in-ovh OVH kernels. | |
| # | |
| # VERSION :0.2 | |
| # DATE :2015-02-10 | |
| # AUTHOR :Viktor Szépe <[email protected]> | |
| # LICENSE :The MIT License (MIT) | |
| # URL :https://github.com/szepeviktor/debian-server-tools | |
| # BASH-VERSION :4.2+ |
| # References: | |
| # http://blog.mixu.net/2011/08/13/nginx-websockets-ssl-and-socket-io-deployment/ | |
| # http://blog.exceliance.fr/2012/09/10/how-to-get-ssl-with-haproxy-getting-rid-of-stunnel-stud-nginx-or-pound/ | |
| # | |
| global | |
| nbproc 2 | |
| maxconn 16384 | |
| defaults |
| # force HTTP to HTTPS - /etc/nginx/conf.d/nonssl.conf | |
| server { | |
| listen 80; | |
| server_name jira.example.com; | |
| access_log off; | |
| return 301 https://$server_name$request_uri; | |
| } | |
| # /etc/nginx/conf.d/jira.conf | |
| server { |
For excessively paranoid client authentication.
Organization & Common Name: Some human identifier for this server CA.
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
| # swith to sudo | |
| sudo -i | |
| # create swap | |
| touch /2GiB.swap | |
| chattr +C /2GiB.swap | |
| fallocate -l 2048m /2GiB.swap | |
| chmod 600 /2GiB.swap | |
| mkswap /2GiB.swap |
| package main | |
| import ( | |
| "crypto/tls" | |
| "crypto/x509" | |
| "fmt" | |
| "io" | |
| "log" | |
| ) |