Skip to content

Instantly share code, notes, and snippets.

View alopresto's full-sized avatar
🔏
Focusing on NiFi security...

Andy LoPresto alopresto

🔏
Focusing on NiFi security...
View GitHub Profile
@kevdoran
kevdoran / docker-compose.yml
Created October 24, 2018 21:39
NiFi Reverse Proxy Traefik example
#
# to use this, run `docker-compose up` in the directory holding this gist.
# or wget/curl the file and pipe it it into `docker-compose up`
#
version: "3.5"
services:
reverse-proxy:
@ijokarumawak
ijokarumawak / 0.NiFi-Loop-flow-example.md
Last active March 20, 2024 13:36
NiFi Loop Flow Example

NiFi Loop flow example

This template is analogous to the traditional for(i = 0; i < x; i++) loop in NiFi Data flow.

@mihigh
mihigh / .bash_profile
Created December 11, 2015 12:36
Iterm2 - ssh change background color when in production
# .bash_profile
# Copy this file on the desired machine.
# This script will change your iterm tab color and the background for that tab.
# Requirements
# - iterm as terminal
# - a profile named Prod in iterm. You can configure it how ever you want. A profile can be found in Preferences -> Profiles
@FredericJacobs
FredericJacobs / gist:b1b518125b7066880359
Last active November 7, 2021 09:54
Some notes about Reporta app since some people expressed worry about Reporta's security.

Analytics

Analytics track you, but they also keep local files really useful for forensics to gather evidence against you.

Google Analytics

Because of course, you need to know if people actually use it when it's developed by a PR firm. Google Analytics tracks a lot of your moves and stored locally in a cache then uploaded to Google servers. Every action is logged.

@v0lkan
v0lkan / dsaqdcs.md
Last active January 14, 2023 23:22
Data Structures and Algorithms Quick And Dirty Cheat Sheet

Caveat

The tables in this cheatsheet only make sense after you study all thes mentioned data structures and algorithms below.

Do not memorize them, learn how the underlying algorithms work, read the source.

This cheat sheet is just a quick reference to give an broad brush strokes overview of how the most frequently-used data structures and algorithms relate to each other, in terms of time and space complexity.

@natereed
natereed / CRMClientTest.java
Last active December 30, 2016 00:35
Stubbing/mocking Jersey Client. Inspired by WebMock.
import org.junit.Before;
import org.junit.Test;
import java.util.HashMap;
import java.util.Map;
public class CRMClientTest {
private CRMClient crmClient;
private StubbedClientHandler clientHandler;
@craSH
craSH / Password.java
Last active January 19, 2024 14:26
A simple example Java class to safely generate and verify bcrypt password hashes for use in authentication systems.
/**
* Author: Ian Gallagher <igallagher@securityinnovation.com>
*
* This code utilizes jBCrypt, which you need installed to use.
* jBCrypt: http://www.mindrot.org/projects/jBCrypt/
*/
public class Password {
// Define the BCrypt workload to use when generating password hashes. 10-31 is a valid value.
private static int workload = 12;