Assuming a file like .env
in the local workspace folder that looks like
FOO=value
BAR=value2
Add the following to the VSCode settings.json
Assuming a file like .env
in the local workspace folder that looks like
FOO=value
BAR=value2
Add the following to the VSCode settings.json
# this assumes you've already connected to the target device with | |
# adb connect 192.168.X.X | |
# grab all the APKS off the device to local machine | |
# based on https://stackoverflow.com/a/4033005 | |
# this works for firetv stick 4k, but didn't work on a slightly older device for some reason | |
# for i in $(adb shell pm list packages | awk -F':' '{print $2}'); do adb pull "$(adb shell pm path $i | awk -F':' '{print $2}')"; mv base.apk $i.apk 2&> /dev/null ;done | |
# use -f to grab path along with app and split it out in the loop | |
# additionally -3 lists only separately installed packages | |
# adb shell pm list packages -f -3 |
version: '2.4' | |
services: | |
# https://hub.docker.com/r/pihole/pihole/ | |
pihole: | |
container_name: pihole | |
image: pihole/pihole:latest | |
restart: unless-stopped | |
environment: | |
- TZ=America/Los_Angeles | |
- DNS1=1.1.1.1 |
# ./test.sh | |
140529043738688:error:20087002:BIO routines:BIO_lookup:system lib:../crypto/bio/b_addr.c:694:Name or service not known | |
connect:errno=2 | |
else branch - ignored error - output: foo | |
command output: | |
bar | |
140510615253056:error:20087002:BIO routines:BIO_lookup:system lib:../crypto/bio/b_addr.c:694:Name or service not known | |
connect:errno=2 | |
entered loop - ignored error | |
bar |
# based on tunnelChecker from | |
# https://github.com/mrjackyliang/tunnelChecker | |
# modified to work on Alpine and doesn't require a script in the container | |
CONTAINER=transmission | |
# alpine container will always have ash (even if bash installed) | |
docker exec -i $CONTAINER sh <<'EOF' | |
PORT_FORWARD=12345 | |
IP_CHECK=http://ipinfo.io/ip |
Write-Host "Waiting for containers to exit." -NoNewLine | |
while ($(docker ps -q)) | |
{ | |
Write-Host "." -NoNewLine | |
Start-Sleep 1 | |
} | |
Write-Host | |
Write-Host "Stopping Azure Agent" | |
Stop-Service vstsagent* |
# must be run as an admin | |
Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\' -Name DisableAntiSpyware -Value 1 | |
Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\' -Name DisableRoutinelyTakingAction -Value 1 | |
Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\' -Name ServiceKeepAlive -Value 0 | |
New-Item -Path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender' -Name 'Exclusions' -ErrorAction Ignore | |
Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions' -Name 'Exclusions_Paths' -Value 1 | |
New-Item -Path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions' -Name Paths -ErrorAction Ignore | |
Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths' -Name 'Complete Drive' -Value 'C:\' |
GoPro Hero7 Black
C:\Program Files\GoPro\GoPro Desktop App\telemetrydata\DataProfiles
, including the file Hero7BlackGPMF.xml
C:\Users\Parity\Documents\DashWare\DataProfiles
that is created when the new profile is created inside Dashware
NOTE: There is also a folder at C:\Program Files\DashWare\DataTool\DataProfiles
which is irrelevant
More info at:
TUN.sh
to be setup to enable the VPN tunnel/user/local/etc/services.d
files - https://forum.synology.com/enu/viewtopic.php?t=86531#p326803function Get-DockerConfigFilePath | |
{ | |
$path = "${ENV:ALLUSERSPROFILE}\docker\config\daemon.json" | |
# retrieve the path to daemon.json from docker service config, if present | |
sc.exe qc docker | | |
? { $_ -match 'BINARY_PATH_NAME\s*:\s*(.*)' } | | |
? { $_ -match '--config-file\s*(.*daemon\.json)' } | |
# found BINARY_PATH_NAME which contains --config-file *AND* file exists |