An interactive PSA by Brian Lechthaler
note: if you're viewing this on GitHub the following line willl not contain a clickable link. Thanks, GitHub security team!
Is your markdown parser vulnerable to XSS? click here to find out!
ssh-rsa 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 |
OPENQASM 2.0; | |
include "qelib1.inc"; | |
qreg q[5]; | |
creg c[5]; | |
# Initialize Hartree Fock State | |
x q[0]; | |
x q[1]; |
-----BEGIN PGP PUBLIC KEY BLOCK----- | |
mQINBF7r82YBEACYhH6smrmy/FKkA6rVB8u7IHZI29VDTn4baMMD22GsEIBhdRLr | |
sCb15spX9HjvoX0HTWOEC1tmslLaoMQTPp/3jjiMMUgmOaQn7z9hnLmUEljgRniY | |
ED13WixTtm2AXtAU5Ae6uCLWHrlEj9PkdGd6OWOugP2z5sN0TpvUM93PIPOlnpNf | |
yViGfucTI0xQuYrEfzmVWkOQJm4cOZNU03oKVJkWzDz/vQxE92c67Ut3h8XQYg65 | |
HIdzwdJqu6XrhLSkm+gO2nCYcbMMllxpzmFi7glBpceoVt0yiNjp6NPaIUpjm87t | |
nIa5CN3xvhsRbOWvc4jkuv19QHg3TL8irOVK+jFoNypBjv97iXsdGo+LPF7BPdnX | |
bMbJzTVjJT0lYf861OJwULa7c9sl/J0ldx6kb3yzanCCitFHmjwD/J3MRRVRuwkr | |
3wwOz2uZ09cNqLNPk1xWWTzRI6lbcDgTS+VFSFQt2EcTnFKNl1jfxKPp+MbtvfCL |
OPENQASM 2.0; | |
include "qelib1.inc"; | |
# Initialize 1 quantum register (1 qubit) | |
qreg q[1]; | |
# Initialize 1 classic register (1 bit) | |
creg c[1]; | |
#Place a Hadamard gate at the beginning of the first qubit | |
h q[0]; |
Already have image (with digest): gcr.io/cloud-builders/docker | |
Sending build context to Docker daemon 86.53kB | |
Step 1/6 : FROM alpine | |
latest: Pulling from library/alpine | |
801bfaa63ef2: Pulling fs layer | |
801bfaa63ef2: Verifying Checksum | |
801bfaa63ef2: Download complete | |
801bfaa63ef2: Pull complete | |
Digest: sha256:3c7497bf0c7af93428242d6176e8f7905f2201d8fc5861f45be7a346b5f23436 | |
Status: Downloaded newer image for alpine:latest |
OPENQASM 2.0; | |
include "qelib1.inc"; | |
qreg q[2]; | |
creg c[2]; | |
reset q[0]; | |
reset q[1]; | |
h q[0]; | |
h q[1]; |
#!/bin/sh | |
#Store the name of the user who invoked this script to set appropriate permissions later | |
export invokingUser=$(whoami) | |
echo "Usage: ./efs-bootstrap.sh <EFS_Filesystem_ID> <MountPoint>" | |
echo "Example: ./efs-bootstrap.sh fs-deadbeef /mnt/efs/fs1/" | |
#Ensure target directory exists | |
sudo mkdir -p $2 |
#!/bin/sh | |
export invokingUser=$(whoami) | |
echo "Usage: ./mkramdisk.sh <disk_size_bytes> <ramdisk_mountpoint>" | |
echo "Example: ./mkramdisk.sh 1G /mnt/ramdisk" | |
sudo mkdir -p $2 | |
sudo chown -R $invokingUser:$invokingUser $2 | |
sudo mount -t tmpfs -o size=$1 tmpfs $2 |
#!/bin/sh | |
echo "USAGE: ./gpgpw.sh <number of characters> <long key ID to encrypt password to> <output file>" | |
echo "EXAMPLE: ./gpgpw.sh 1024 DEADBEEF0000FFFF0000FFFF0000FFFF0000FFFF /mnt/encrypted_password.asc /dev/xvdg" | |
export password=$(pwgen -sy $1 1) | |
echo $password | cryptsetup luksFormat $4 - | |
export password=$(echo $password | gpg --encrypt -a -r $2) | |
echo $password | |
echo $password > $3 |
An interactive PSA by Brian Lechthaler
note: if you're viewing this on GitHub the following line willl not contain a clickable link. Thanks, GitHub security team!
Is your markdown parser vulnerable to XSS? click here to find out!