Skip to content

Instantly share code, notes, and snippets.

@ammgws
ammgws / create-iso.sh
Created August 29, 2023 13:42 — forked from julianxhokaxhiu/create-iso.sh
Simple bash script to create a Bootable ISO from macOS Catalina Install Image from Mac App Store
#!/usr/bin/env bash
#===========================================================================
# Works only with the official image available in the Mac App Store.
# Make sure you download the official installer before running this script.
#===========================================================================
hdiutil create -o /tmp/Catalina.cdr -size 9000m -layout SPUD -fs HFS+J
hdiutil attach /tmp/Catalina.cdr.dmg -noverify -mountpoint /Volumes/install_build
sudo /Applications/Install\ macOS\ Catalina.app/Contents/Resources/createinstallmedia --volume /Volumes/install_build --nointeraction
hdiutil detach "/Volumes/Install macOS Catalina"
@ammgws
ammgws / reddit_video_fallbackURL_bookmarklet.js
Created August 2, 2023 07:47
Bookmarklet to get Reddit Video fallback URL (tested in Firefox)
javascript:(function() {
var currentUrl = window.location.href;
if (!currentUrl.includes("reddit")) {
alert("This bookmarklet is designed for Reddit pages only.");
return;
}
var jsonUrl = currentUrl + ".json";
fetch(jsonUrl)
.then(response => response.json())
.then(data => {
[
{
"identifier": "2:7:SynPS\/2_Synaptics_TouchPad",
"name": "SynPS\/2 Synaptics TouchPad",
"vendor": 2,
"product": 7,
"type": "touchpad",
"scroll_factor": 1.0,
"libinput": {
"send_events": "enabled",
@ammgws
ammgws / biostar_b660gtn_iommu_groups.md
Last active March 22, 2022 04:41
Biostar B660GTN IOMMU groups

With iGPU disabled in BIOS and a dedicated GPU in the one and only PCI slot:

>lsiommu                                                                                                                      0|16:55:43
IOMMU Group 0:
	00:00.0 Host bridge [0600]: Intel Corporation Device [8086:4650] (rev 02)
IOMMU Group 1:
	00:01.0 PCI bridge [0604]: Intel Corporation 12th Gen Core Processor PCI Express x16 Controller #1 [8086:460d] (rev 02)
IOMMU Group 2:
	00:06.0 PCI bridge [0604]: Intel Corporation 12th Gen Core Processor PCI Express x4 Controller #0 [8086:464d] (rev 02)
@ammgws
ammgws / WormsWMD-Archlinux.md
Created February 26, 2022 09:48 — forked from sxiii/WormsWMD-Archlinux.md
How to fix Worms W.M.D. launch on ArchLinux, Manjaro, Garuda, Artix Linux & Linux Mint

Game information Worms W.M.D.

Distribution name and version where applicable Manjaro 20.1.1 (Mikah)

Problem description Worms doesn't launch out of the box without two small tweaks. When launching Worms W.M.D. in Manjaro and Archlinux, you need to do two things:

  1. Install this apps: sudo pacman -S libcurl-gnutls libidn11 qt5-base qt5-xcb-private-headers(If you are on any other distro then Arch, you can skip this step. At least this is reported to be OK to skip for Linux Mint)
2750484632323130306d8e3d6a013701
035344534336344780b19111ed011901
2750485454525345506de24e56015201
@ammgws
ammgws / homeassistant_local_network_HTTPS.md
Last active October 5, 2021 14:16
Get Home Assistant running on local network via HTTPS using a trusted local certificiate

Background

Fitbit integration requires the OAUTH2 callback URI to be HTTPS, which is an issue since Home Assistant by default only runs in HTTP. Additionally, I do not wish to expose HA to the internet and only access it externally via VPN into my home network. So the solution is to generate our own cert to install in Home Assistant, and store that root CA in the trusted CA list on the computer from which the HA front end is going to be accessed. This will be done using the mkcert tool: https://github.com/FiloSottile/mkcert

On my deskop (not the computer running HA)

1. Generate a cert which is valid for both the hostname address and the IP address of my HA instance.

mkcert -install
mkcert homeassistant.home.lan 192.168.1.5
@ammgws
ammgws / upnper4dont.md
Created September 2, 2021 11:50 — forked from plembo/upnper4dont.md
UPnP with EdgeRouter: Don't do it!

Want to configure UPnP on EdgeRouter-4?

Don't do it!

Introduction

As a former sysadmin that once helped ride herd over around 1,000 servers, of which around 10% were Internet-facing, I've never been a fan of autoconfiguation when it comes to punching holes through the firewall. I've seen the tripwire logs, and it's sobering.

The Problem

So enabling UPnP on my EdgeRouter-4 wasn't something I had on the roadmap, but when I ran into difficulty getting DLNA to work on the default VLAN, I thought it was worth looking into (never mind that, as I later learned, having UPnP turned on wasn't going make a bit of difference on my local network: another reason that mastering theory should always come before practice).