Track and display recently modified files across your Obsidian vault.
- Monitor files from specific folders
- Group by subfolders
- Customizable time periods and status indicators
- Sort by priority
Gist README
This script loops through all video files in a specified folder, extracts a set number of frames (20 by default), and generates a single sprite sheet (vertical strip) for each video.
Open Windows Terminal Settings:
Add a New Profile:
# Define variables | |
$port = 80 | |
$wslIp = (wsl hostname -I | ForEach-Object { $_.Split(" ")[0] }).Trim() # Get the first IP address of the WSL instance | |
$firewallRuleName = "AllowPort$portToWSL" | |
$netshRuleName = "WSL Port Forwarding $port" | |
# Add a firewall rule to allow inbound traffic on the specified port | |
Write-Host "Adding firewall rule to allow inbound traffic on port $port..." | |
New-NetFirewallRule -DisplayName $firewallRuleName -Direction Inbound -LocalPort $port -Protocol TCP -Action Allow |
# Find the process ID (PID) listening on port | |
$port = 3000 | |
$processId = Get-NetTCPConnection -LocalPort $port | Select-Object -ExpandProperty OwningProcess | |
# Check if processId is found | |
if ($processId) { | |
# Kill the process with the found processId | |
Stop-Process -Id $processId -Force | |
Write-Output "Process with PID $processId listening on port 3000 has been terminated." | |
} else { |
$KnownFolders = @{} | |
$KnownFolders.Add("{DE61D971-5EBC-4F02-A3A9-6C82895E5C04}" , "AddNewPrograms") | |
$KnownFolders.Add("{724EF170-A42D-4FEF-9F26-B60E846FBA4F}" , "AdminTools") | |
$KnownFolders.Add("{A520A1A4-1780-4FF6-BD18-167343C5AF16}" , "AppDataLow") | |
$KnownFolders.Add("{A305CE99-F527-492B-8B1A-7E76FA98D6E4}" , "AppUpdates") | |
$KnownFolders.Add("{9E52AB10-F80D-49DF-ACB8-4330F5687855}" , "CDBurning") | |
$KnownFolders.Add("{DF7266AC-9274-4867-8D55-3BD661DE872D}" , "ChangeRemovePrograms") | |
$KnownFolders.Add("{D0384E7D-BAC3-4797-8F14-CBA229B392B5}" , "CommonAdminTools") | |
$KnownFolders.Add("{C1BAE2D0-10DF-4334-BEDD-7AA20B227A9D}" , "CommonOEMLinks") | |
$KnownFolders.Add("{0139D44E-6AFE-49F2-8690-3DAFCAE6FFB8}" , "CommonPrograms") |
#!/bin/bash | |
# Script to add inbound IPv4 ports to the iptables configuration. | |
# Ensure the script is being run as root | |
if [[ $EUID -ne 0 ]]; then | |
echo "This script must be run as root" | |
exit 1 | |
fi |
#!/bin/bash | |
# Create a file with the list of URLs to download | |
echo -e "#\nhttps://huggingface.co/TheBloke/Falcon-180B-Chat-GGUF/resolve/main/falcon-180b-chat.Q4_K_M.gguf-split-a\n out=falcon-180b-chat.Q4_K_M.gguf-split-a\nhttps://huggingface.co/TheBloke/Falcon-180B-Chat-GGUF/resolve/main/falcon-180b-chat.Q4_K_M.gguf-split-b\n out=falcon-180b-chat.Q4_K_M.gguf-split-b\nhttps://huggingface.co/TheBloke/Falcon-180B-Chat-GGUF/resolve/main/falcon-180b-chat.Q4_K_M.gguf-split-c\n out=falcon-180b-chat.Q4_K_M.gguf-split-c" > ~/urls.txt | |
# Use aria2 to download files in parallel | |
aria2c -x 6 -i ~/urls.txt -d ~ | |
# Concatenate the downloaded files | |
cat ~/falcon-180b-chat.Q4_K_M.gguf-split-a ~/falcon-180b-chat.Q4_K_M.gguf-split-b ~/falcon-180b-chat.Q4_K_M.gguf-split-c > ~/falcon-180b-chat.Q4_K_M.gguf |
#requires -version 5.1 | |
#requires -module GroupPolicy,ActiveDirectory | |
Function Get-GPLink { | |
<# | |
.Synopsis | |
Get Group Policy Object links | |
.Description | |
This command will display the links to existing Group Policy objects. You can filter for enabled or disabled links. The default user domain is queried although you can specify an alternate domain and/or a specific domain controller. There is no provision for alternate credentials. |
using System; | |
using System.Collections.Generic; | |
using System.Linq; | |
using System.Runtime.InteropServices; | |
using System.Threading; | |
using System.Text; | |
using System.Threading.Tasks; | |
namespace hollow | |
{ |