Track and display recently modified files across your Obsidian vault.
- Monitor files from specific folders
- Group by subfolders
- Customizable time periods and status indicators
- Sort by priority
Gist README
This script loops through all video files in a specified folder, extracts a set number of frames (20 by default), and generates a single sprite sheet (vertical strip) for each video.
Open Windows Terminal Settings:
Add a New Profile:
# Define variables | |
$port = 80 | |
$wslIp = (wsl hostname -I | ForEach-Object { $_.Split(" ")[0] }).Trim() # Get the first IP address of the WSL instance | |
$firewallRuleName = "AllowPort$portToWSL" | |
$netshRuleName = "WSL Port Forwarding $port" | |
# Add a firewall rule to allow inbound traffic on the specified port | |
Write-Host "Adding firewall rule to allow inbound traffic on port $port..." | |
New-NetFirewallRule -DisplayName $firewallRuleName -Direction Inbound -LocalPort $port -Protocol TCP -Action Allow |
# Find the process ID (PID) listening on port | |
$port = 3000 | |
$processId = Get-NetTCPConnection -LocalPort $port | Select-Object -ExpandProperty OwningProcess | |
# Check if processId is found | |
if ($processId) { | |
# Kill the process with the found processId | |
Stop-Process -Id $processId -Force | |
Write-Output "Process with PID $processId listening on port 3000 has been terminated." | |
} else { |
jsonData='[{"name": "name#1","value": "value#1"},{"name": "name#2","value": "value#2"}]' | |
for row in $(echo "${jsonData}" | jq -r '.[] | @base64'); do | |
_jq() { | |
echo "${row}" | base64 --decode | jq -r "${1}" | |
} | |
# OPTIONAL | |
# Set each property of the row to a variable | |
name=$(_jq '.name') | |
value=$(_jq '.value') |
@ setlocal enableextensions | |
@ cd /d "%~dp0" | |
for /R %%a in (*.exe) do ( | |
netsh advfirewall firewall add rule name="Blocked with Batchfile %%a" dir=out program="%%a" action=block | |
) |
$KnownFolders = @{} | |
$KnownFolders.Add("{DE61D971-5EBC-4F02-A3A9-6C82895E5C04}" , "AddNewPrograms") | |
$KnownFolders.Add("{724EF170-A42D-4FEF-9F26-B60E846FBA4F}" , "AdminTools") | |
$KnownFolders.Add("{A520A1A4-1780-4FF6-BD18-167343C5AF16}" , "AppDataLow") | |
$KnownFolders.Add("{A305CE99-F527-492B-8B1A-7E76FA98D6E4}" , "AppUpdates") | |
$KnownFolders.Add("{9E52AB10-F80D-49DF-ACB8-4330F5687855}" , "CDBurning") | |
$KnownFolders.Add("{DF7266AC-9274-4867-8D55-3BD661DE872D}" , "ChangeRemovePrograms") | |
$KnownFolders.Add("{D0384E7D-BAC3-4797-8F14-CBA229B392B5}" , "CommonAdminTools") | |
$KnownFolders.Add("{C1BAE2D0-10DF-4334-BEDD-7AA20B227A9D}" , "CommonOEMLinks") | |
$KnownFolders.Add("{0139D44E-6AFE-49F2-8690-3DAFCAE6FFB8}" , "CommonPrograms") |
#!/bin/bash | |
# Script to add inbound IPv4 ports to the iptables configuration. | |
# Ensure the script is being run as root | |
if [[ $EUID -ne 0 ]]; then | |
echo "This script must be run as root" | |
exit 1 | |
fi |
#!/bin/bash | |
# Create a file with the list of URLs to download | |
echo -e "#\nhttps://huggingface.co/TheBloke/Falcon-180B-Chat-GGUF/resolve/main/falcon-180b-chat.Q4_K_M.gguf-split-a\n out=falcon-180b-chat.Q4_K_M.gguf-split-a\nhttps://huggingface.co/TheBloke/Falcon-180B-Chat-GGUF/resolve/main/falcon-180b-chat.Q4_K_M.gguf-split-b\n out=falcon-180b-chat.Q4_K_M.gguf-split-b\nhttps://huggingface.co/TheBloke/Falcon-180B-Chat-GGUF/resolve/main/falcon-180b-chat.Q4_K_M.gguf-split-c\n out=falcon-180b-chat.Q4_K_M.gguf-split-c" > ~/urls.txt | |
# Use aria2 to download files in parallel | |
aria2c -x 6 -i ~/urls.txt -d ~ | |
# Concatenate the downloaded files | |
cat ~/falcon-180b-chat.Q4_K_M.gguf-split-a ~/falcon-180b-chat.Q4_K_M.gguf-split-b ~/falcon-180b-chat.Q4_K_M.gguf-split-c > ~/falcon-180b-chat.Q4_K_M.gguf |