This is an OpenPGP proof that connects my OpenPGP key to this Github account. For details check out https://keyoxide.org/guides/openpgp-proofs
[Verifying my OpenPGP key: openpgp4fpr:D33D50487D439D33F69AC02EE45EBE8180284FEB]
This is an OpenPGP proof that connects my OpenPGP key to this Github account. For details check out https://keyoxide.org/guides/openpgp-proofs
[Verifying my OpenPGP key: openpgp4fpr:D33D50487D439D33F69AC02EE45EBE8180284FEB]
If you are like me, lazy but able to get some crazy ideas sometime
I must admit that what I'm gonna explain is working only
because Linden Labs seems to have no clue about how security should be implemented correctly...The above sentence is only valid if you've not enabled the MFA on your account.
For example, if a bad actor gets hands on your
session
cookie, nothing will avoid that bad actor to impersonate your account without any time limit! >
In this document, I will explain how to setup apcupsd
on Ubuntu 18.04 and 20.04.
I'll only document USB
connected UPS and not the other supported connection modes.
If you have followed my previous gist related to nut
, I'd serisouly recommend you to cleanup everything before continuing this gist.
In this document, I will explain how to setup nut
(Network UPS Tools) on Ubuntu 18.04 and 20.04.
It is basically the next chapter of my previous gist, Upgrade nut on Ubuntu 18.04.
I'll only document USB
connected UPS and not the other supported connection modes.
In this document, I will explain how to upgrade the default nut
(Network UPS Tools) version from 2.7.4-5.1ubuntu2 to 2.7.4-11ubuntu4.
It is basically the same process as the one used in my previous upgrade gist, Upgrade systemd on Ubuntu 18.04.
The main reason why you would follow this gist is because by default the UPS detection tool nut-scanner
is not available by default on Ubuntu 18.04 and can't be compiled correctly from source due to non standard library linking used that does not find the shared library even if it is correctly installed / loaded on the system.
Maybe you have been more lucky than me on your side and then you can simply leave this gist
An easy way to start the embedded PHP web server with the multi-thread option enabled or simulated when necessary.
In all of my coding projects, I like to follow these principles:
Few months ago, I've made a similar work but I wanted something a little more easier to manage. Please have a look at here for my previous work.
This time, I'm gonna do pretty much the same thing but using Pi-hole as base then modify it to include unbound
and stubby
.
This way, I can use the power of Pi-hole with some additional security layers:
unbound
)stubby
)#!/bin/bash | |
# | |
# Prints the compute capability of the first CUDA device installed | |
# on the system, or alternatively the device whose index is the | |
# first command-line argument | |
device_index=${1:-0} | |
timestamp=$(date +%s.%N) | |
gcc_binary=${CMAKE_CXX_COMPILER:-$(which c++)} | |
cuda_root=${CUDA_DIR:-/usr/local/cuda} |
This gist will explain how to install and setup Hashcat brain
on a Raspberry Pi based cluster.
I've initially tried to use VC4CL instead of POCL but I could not compile it on Ubuntu Server 18.04.5.
Even if I've also compiled CMake as requested, the compilation failed anyway...
This gist will explain how to create a DNS-over-TLS
bridge for the local network.
The server part will be based on: https://dfarq.homeip.net/dns-over-tls-protect-your-network-with-ubuntu/.
Install required packaages: