I hereby claim:
- I am silvenga on github.
- I am silvenga (https://keybase.io/silvenga) on keybase.
- I have a public key whose fingerprint is DC75 80D8 0D67 53DC F209 2A54 37F1 A037 FEF7 8709
To claim this, I am signing this object:
| #!/bin/bash | |
| # Place in /usr/share/backup/ | |
| # and make executable | |
| # chmod 0744 dup-backup.sh | |
| # install: | |
| # apt-get install duplicity python-gdata python-gobject-2 python-paramiko | |
| ## Remeber to change Google drive user name and Google drive folder | |
| ## And change Email | |
| # Must run as root for system wide backups |
| start on filesystem and started networking | |
| stop on shutdown | |
| author "Mark Lopez" | |
| description "Ghost Upstart Job" | |
| version "0.2" | |
| respawn | |
| respawn limit 5 30 |
| package com.silvenga.singleton; | |
| import java.util.Random; | |
| public class RandomSingleton | |
| // Basic interface for a Singleton | |
| public static Random getInstance() { | |
| // Return the instance of Random created in RandomContainer |
| #!/bin/bash | |
| echo " | |
| ############################################################################### | |
| Download tests. Warning: downloads approx 100MB per site. Total approx 1.8GB | |
| ############################################################################### | |
| " | |
| function download_benchmark() { | |
| #echo "Benchmarking download from $1 ($2)" |
| #!/bin/bash | |
| ######################################################### | |
| mgUSERNAME="MailGun Username" | |
| mgPASSWORD="COMPLEX PASSWORD" | |
| testEmail="user@example.com" | |
| ######################################################### | |
| echo "Installing this agent may be dangerous, make sure this is the correct server!" |
| <!-- This is a jquery plugin - we need jquery > 2.1 --> | |
| <script src="https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js"></script> | |
| <!-- Off load the animations to CSS so we can get hardware acceleration --> | |
| <link rel="stylesheet" type="text/css" href="jquery.lazyView.min.css" /> | |
| <!-- The lazyView script --> | |
| <script src="jquery.lazyView.min.js"></script> | |
| <script> | |
| $(document).ready(function() { | |
| // Select the HTML portion to lazyView. |
I hereby claim:
To claim this, I am signing this object:
| Windows Registry Editor Version 5.00 | |
| [HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions\Slight] | |
| "Colour0"="240,240,240" | |
| "Colour1"="255,255,255" | |
| "Colour2"="63,63,65" | |
| "Colour3"="103,103,103" | |
| "Colour4"="0,0,0" | |
| "Colour5"="0,255,0" | |
| "Colour6"="21,23,26" |
| # | |
| # Mark Lopez (Silvenga) <m@silvenga.com> | |
| # https://silvenga.com | |
| # | |
| {% set requirements = ['jinja2', 'flask', 'flask-wtf', 'requests', 'pymongo', 'werkzeug==0.9.4', 'cherrypy'] %} | |
| {% set install_path = '/opt/saltpad' %} | |
| {% set git_rev = 'f62809f6a854b9e9d49bd1534b09b7943abec354' %} | |
| {% set api_url = 'https://YOURSALTMASTER.net' %} | |
| {% set secret_key = '' %} |
| #!/bin/bash | |
| export PASSPHRASE={{ grains['backup.password'] }} | |
| export AWS_ACCESS_KEY_ID={{ grains['backup.aws_id'] }} | |
| export AWS_SECRET_ACCESS_KEY={{ grains['backup.aws_key'] }} | |
| FOLDER={{ grains['id'] }} | |
| TARGET=s3+http://{{ grains['backup.aws_bucket'] }}/$FOLDER | |
| SOURCE=/ | |
| LOGLOC=/var/log/nightly-backup |