Skip to content

Instantly share code, notes, and snippets.

View Prajwal-Koirala's full-sized avatar
😀
Pushing code like it's nobody's business 💻🚀 #CodingLife #OpenSource #GitHub

Prajwal Koirala Prajwal-Koirala

😀
Pushing code like it's nobody's business 💻🚀 #CodingLife #OpenSource #GitHub
  • 05:57 (UTC -04:00)
View GitHub Profile
  1. Ghost Vapors: Sells Best Bulk THC-O Acetate Distillate, described as Honey Gold Oil, suitable for various uses including dabbing and edibles. This distillate is available in different sizes including 100 grams【28†source】.
  2. CannaAid: Provides a variety of Delta-8 THC distillates in different strains like Granddaddy Purp, Durban Poison, and White Widow. They offer potent distillates in an easy-to-use format, suitable for various applications【29†source】.
  3. Extract Labs: Offers Bulk Delta 8 Distillate in different quantities including 100 grams. It is ready for use in vape formulations and other applications【30†source】.
  4. Fresh Bros: Sells Delta 8 Distillate in sizes including 100 grams. The product is known for its high potency and quality, and they provide excellent customer service【31†source】.
  5. Vivimu.com: Identified as a top competitor to cannaclear.com, Vivimu offers a range of cannabinoid products including THC-O【7†source】.
  6. Cbdfarmhouse.com: This site offers a variety of

Here's a terminal guide to pull the Docker Ubuntu image and run it from the terminal in macOS:

1. Install Docker Desktop:

2. Pull the Ubuntu image:

  • Open a terminal window (Applications > Utilities > Terminal).

File Extensions for Different File Types

File Type File Extension
Batch .bat
C .c
C# .cs
C++ .cpp, .h
CSS .css
Clojure .clj, .cljs
@Prajwal-Koirala
Prajwal-Koirala / gist:8991edb619b7bde7621442856c763aae
Created December 11, 2023 17:38
Using `duti` to Open .json Files with VSCode
## Using `duti` to Open .json Files with VSCode
This guide shows you how to use the `duti` command on macOS to associate the `.json` file extension with Visual Studio Code (VSCode).
**Prerequisites:**
* macOS
* `duti` command-line tool (pre-installed)
* VSCode installed
Preventing a laptop from being monitored by government entities can be challenging, as it often requires advanced technical knowledge and ongoing diligence. While it's not possible to guarantee complete protection, here are some general steps you can take to enhance your privacy and security:
1. Use encryption: Enable full-disk encryption on your laptop to protect your data in case it falls into the wrong hands. Most modern operating systems offer built-in encryption features. Additionally, consider using encryption tools for sensitive files and communications, such as VeraCrypt or GPG (GNU Privacy Guard).
2. Secure your internet connection: Utilize a Virtual Private Network (VPN) to encrypt your internet traffic and mask your IP address. This can help protect your online activities from being easily monitored. Choose a reputable VPN service with a strict no-logs policy.
3. Keep software updated: Regularly update your operating system, web browsers, and other software installed on your laptop. These update
Preventing a phone from being tracked by the government or any other entity can be a challenging task, as modern smartphones are designed to have various built-in tracking mechanisms. However, here are a few measures you can take to enhance your privacy and reduce tracking:
1. **Use encrypted messaging apps**: Utilize end-to-end encrypted messaging apps such as Signal, WhatsApp, or Telegram to secure your conversations. These apps protect the content of your messages from being intercepted or accessed by third parties.
2. **Disable location services**: Turn off location services or restrict them only to specific apps that require them. This prevents your phone from constantly transmitting your location data to various apps and services.
3. **Avoid using public Wi-Fi networks**: Public Wi-Fi networks can be vulnerable to tracking and surveillance. Whenever possible, use secure and private networks, such as your mobile data plan or trusted Wi-Fi networks with strong passwords.
4. **Use a Virtual Private Net