Written for fairly adept technical users, preferably of Debian GNU/Linux, not for absolute beginners.
You'll probably be working with a single smartcard, so you'll want only one primary key ( |
# Description: Boxstarter Script | |
# Author: Jess Frazelle <jess@linux.com> | |
# Last Updated: 2017-09-11 | |
# | |
# Install boxstarter: | |
# . { iwr -useb http://boxstarter.org/bootstrapper.ps1 } | iex; get-boxstarter -Force | |
# | |
# You might need to set: Set-ExecutionPolicy RemoteSigned | |
# | |
# Run this boxstarter by calling the following from an **elevated** command-prompt: |
You'll probably be working with a single smartcard, so you'll want only one primary key ( |
*update: TBC, but this new might affect how easy it is to use this technique past August 2024: Authy is shutting down its desktop app | The 2FA app Authy will only be available on Android and iOS starting in August
This gist, based in part on a gist by Brian Hartvigsen, allows you to export from Authy your TOTP tokens you have stored there.
Those can be "standard" 6-digits / 30 secs tokens, or Authy's own version, the 7-digits / 10 secs tokens.
#include <stdio.h> | |
#include <stdarg.h> | |
#include <stdlib.h> | |
#include <time.h> | |
#include <libiberty/libiberty.h> | |
#include "log.h" | |
#include "config.h" | |
#define BUFSIZE 1024 |
#!/bin/sh | |
showHelp() { | |
cat <<EOF | |
This script requires 2 or 3 arguments exactly. | |
"${0}" <redhat username> <redhat password> [<redhat release>] | |
examples: | |
"${0}" user1 passw0rd! 7Server | |
"${0}" user2 pAssw@rd | |
By default the omission of the release version will default to 7Server being set. |
#!/bin/bash | |
for d in $(find /sys/kernel/iommu_groups/ -type l | sort -n -k5 -t/); do | |
n=${d#*/iommu_groups/*}; n=${n%%/*} | |
printf 'IOMMU Group %s ' "$n" | |
lspci -nns "${d##*/}" | |
done; |
add-pssnapin microsoft.sharepoint.powershell | |
$MySiteUrl = "https://mysiteurl.domain.com" | |
$DomainNamePrefix = "MYDOMAIN" | |
$strImageFolder = "\\UNC\PATH\TO\IMAGES" | |
$imageDepth = 1 #Images are in subfolders off of the specified folder, but we dont want sub-sub folders | |
$logFile = "C:\Scripts\UploadProfilePhotos.log" | |
$tempImageFolder = "C:\Scripts\Temp" |
/** | |
* Returns SHA-256 hash from supplied message. | |
* | |
* @param {String} message. | |
* @returns {String} hash as hex string. | |
* | |
* @example | |
* sha256('abc').then(hash => console.log(hash)); | |
* const hash = await sha256('abc'); | |
*/ |
#!/bin/bash | |
# Referenced and tweaked from http://stackoverflow.com/questions/6174220/parse-url-in-shell-script#6174447 | |
proto="$(echo $1 | grep :// | sed -e's,^\(.*://\).*,\1,g')" | |
# remove the protocol | |
url="$(echo ${1/$proto/})" | |
# extract the user (if any) | |
userpass="$(echo $url | grep @ | cut -d@ -f1)" | |
pass="$(echo $userpass | grep : | cut -d: -f2)" | |
if [ -n "$pass" ]; then |
#!/bin/sh | |
function verify_file { | |
unsig_exe_tmp=`mktemp`; | |
# Remove the signature from the file and save to disk | |
objcopy --remove-section=sigdata $1 $unsig_exe_tmp; | |
# Extract the signature and verify it against the unsigned executable | |
objcopy --dump-section sigdata=/dev/stdout $1 | gpg --verify - $unsig_exe_tmp; |