(C-x means ctrl+x, M-x means alt+x)
The default prefix is C-b. If you (or your muscle memory) prefer C-a, you need to add this to ~/.tmux.conf
:
REM Delete eval folder with licence key and options.xml which contains a reference to it | |
for %%I in ("WebStorm", "IntelliJ", "CLion", "Rider", "GoLand", "PhpStorm", "Resharper", "PyCharm") do ( | |
for /d %%a in ("%USERPROFILE%\.%%I*") do ( | |
rd /s /q "%%a/config/eval" | |
del /q "%%a\config\options\other.xml" | |
) | |
) | |
REM Delete registry key and jetbrains folder (not sure if needet but however) | |
rmdir /s /q "%APPDATA%\JetBrains" |
function promiseAll() { | |
if (!arguments.length) { | |
return Promise.resolve(null); | |
} | |
var args = arguments; | |
if (args.length === 1 && Array.isArray(args[0])) { | |
args = args[0]; | |
} | |
var count = 1; | |
var total = args.length; |
/** | |
* This DLL is designed for use in conjunction with the Ruler tool for | |
* security testing related to the CVE-2024-21378 vulnerability, | |
* specifically targeting MS Outlook. | |
* | |
* It can be used with the following command line syntax: | |
* ruler [auth-params] form add-com [attack-params] --dll ./test.dll | |
* Ruler repository: https://github.com/NetSPI/ruler/tree/com-forms (com-forms branch). | |
* | |
* After being loaded into MS Outlook, it sends the PC's hostname and |
{ | |
"log": { | |
"access": "/var/log/v2ray/access.log", | |
"error": "/var/log/v2ray/error.log", | |
"loglevel": "warn" | |
}, | |
"inbounds": [ | |
{ | |
"port": 443, | |
"tag": "itor", |
Lines starting with #
mean the commands have to be executed by root user under Linux shell (WSL distro).
All other commands have to be executed under Windows-PowerShell as Administrator.
New-VHD support.vhdx -SizeBytes 25GB -Dynamic -BlockSizeBytes 1MB
Write-Output "\\.\PhysicalDrive$((Mount-VHD -Path support.vhdx -PassThru | Get-Disk).Number)"
{ | |
"colorScheme": "Campbell", | |
"commandline": "pwsh.exe -ExecutionPolicy ByPass -NoExit -Command \"& '%USERPROFILE%\\anaconda3\\shell\\condabin\\conda-hook.ps1' ; conda activate '%USERPROFILE%\\anaconda3' \"", | |
"guid": "{e7d34d61-5a57-4f38-8eab-91cb777b0c26}", | |
"hidden": false, | |
"icon": "%USERPROFILE%\\anaconda3\\Menu\\anaconda-navigator.ico", | |
"name": "Anaconda PowerShell Prompt", | |
"startingDirectory": "%USERPROFILE%" | |
} |
# This is a partial regex to split a redis log line | |
# It will parse | |
# Pid | |
# The role (X, C, S, or M - https://github.com/redis/redis/blob/unstable/src/server.c#L130) | |
# Time | |
# level (.,-,*,# which are LOG_DEBUG, LOG_INFO, LOG_NOTICE, LOG_WARNING respectively - https://github.com/redis/redis/blob/unstable/src/server.c#L104) | |
# Message | |
[PARSER] | |
Name redis |
#!/bin/bash | |
usage=" | |
Usage: | |
wall [options] [message] | |
Write a message to all users. | |
Options: | |
-n, --nobanner do not print banner |