See this issue.
Docker best practise to Control and configure Docker with systemd.
-
Create
daemon.json
file in/etc/docker
:{"hosts": ["tcp://0.0.0.0:2375", "unix:///var/run/docker.sock"]}
function Create-AesManagedObject($key, $IV) { | |
$aesManaged = New-Object "System.Security.Cryptography.AesManaged" | |
$aesManaged.Mode = [System.Security.Cryptography.CipherMode]::CBC | |
$aesManaged.Padding = [System.Security.Cryptography.PaddingMode]::Zeros | |
$aesManaged.BlockSize = 128 | |
$aesManaged.KeySize = 256 | |
if ($IV) { | |
if ($IV.getType().Name -eq "String") { | |
$aesManaged.IV = [System.Convert]::FromBase64String($IV) | |
} |
Function Get-WinEventXPathFilter | |
{ | |
<# | |
.SYNOPSIS | |
This function generates an xpath filter that can be used with the -FilterXPath | |
parameter of Get-WinEvent. It may also be used inside the <Select></Select tags | |
of a Custom View in Event Viewer. | |
.DESCRIPTION | |
This function generates an xpath filter that can be used with the -FilterXPath | |
parameter of Get-WinEvent. It may also be used inside the <Select></Select tags |
frontend ssl | |
mode tcp | |
bind 0.0.0.0:443 name frontend-ssl | |
option tcplog | |
log global | |
tcp-request inspect-delay 3s | |
tcp-request content accept if { req.ssl_hello_type 1 } | |
use_backend main-ssl if { req.ssl_hello_type 1 } | |
use_backend ssh if !{ req.ssl_hello_type 1 } { payload(0,7) -m bin 5353482d322e30 } | |
use_backend openvpn if !{ req.ssl_hello_type 1 } !{ req.len 0 } |
google-chrome --use-fake-device-for-media-stream --use-file-for-fake-video-capture=/path/to/video.y4m |
# Creates PTR Records for all A Records in the specified -ZoneName. | |
# Uses a Class A Subnet for the reverse zone. | |
$computerName = 'dns-server01'; | |
# Get all the DNS A Records. | |
$records = Get-DnsServerResourceRecord -ZoneName 'zone.example.com' -RRType A -ComputerName $computerName; | |
foreach ($record in $records) | |
{ | |
# The reverse lookup domain name. This is the PTR Response. | |
$ptrDomain = $record.HostName + '.zone.example.com'; |
See this issue.
Docker best practise to Control and configure Docker with systemd.
Create daemon.json
file in /etc/docker
:
{"hosts": ["tcp://0.0.0.0:2375", "unix:///var/run/docker.sock"]}
accesschk -w -s -u Users "C:\Program Files" >> programfiles.txt | |
accesschk -w -s -u Everyone "C:\Program Files" >> programfiles.txt | |
accesschk -w -s -u "Authenticated Users" "C:\Program Files" >> programfiles.txt | |
accesschk -w -s -u Interactive "C:\Program Files" >> programfiles.txt | |
accesschk -w -s -u "This Organization" "C:\Program Files" >> programfiles.txt | |
accesschk -w -s -u "Authentication authority asserted identity" "C:\Program Files" >> programfiles.txt | |
accesschk -w -s -u "Mandatory Label\Medium Mandatory Level" "C:\Program Files" >> programfiles.txt | |
accesschk -w -s -u %username% "C:\Program Files" >> programfiles.txt | |
accesschk -w -s -u Users "C:\Program Files (x86)" >> programfilesx86.txt |
# (c) Nabil Redmann 2019 | |
# based on https://stackoverflow.com/a/52416973/1644202 | |
function LoadXamlFile | |
{ | |
Param | |
( | |
[Parameter(Mandatory=$true)] $xamlFile | |
) |
<?php | |
use Illuminate\Database\Migrations\Migration; | |
use Illuminate\Database\Schema\Blueprint; | |
use Illuminate\Support\Facades\Schema; | |
class CreateLogTable extends Migration | |
{ | |
/** | |
* Run the migrations. |
# For recent versions of Ubuntu: | |
- https://www.pugetsystems.com/labs/hpc/ubuntu-22-04-server-autoinstall-iso/ | |
# Docs: | |
- https://wiki.ubuntu.com/FoundationsTeam/AutomatedServerInstalls | |
- https://wiki.ubuntu.com/FoundationsTeam/AutomatedServerInstalls/ConfigReference | |
- https://cloudinit.readthedocs.io/en/latest/topics/datasources/nocloud.html | |
- https://discourse.ubuntu.com/t/please-test-autoinstalls-for-20-04/15250/53 | |
# Download ISO Installer: |