chage –I -1 –m 0 –M 99999 –E -1 root
tdnf update
# This script will manually rip out all VMware Tools registry entries and files for Windows 2008-2019 | |
# Tested for 2019, 2016, and probably works on 2012 R2 after the 2016 fixes. | |
# This function pulls out the common ID used for most of the VMware registry entries along with the ID | |
# associated with the MSI for VMware Tools. | |
function Get-VMwareToolsInstallerID { | |
foreach ($item in $(Get-ChildItem Registry::HKEY_CLASSES_ROOT\Installer\Products)) { | |
If ($item.GetValue('ProductName') -eq 'VMware Tools') { | |
return @{ | |
reg_id = $item.PSChildName; |
using System; | |
using System.Collections.Generic; | |
using System.Collections.Immutable; | |
using System.Linq; | |
using Microsoft.CodeAnalysis; | |
using Microsoft.CodeAnalysis.Diagnostics; | |
using Microsoft.CodeAnalysis.Operations; | |
// CREDIT: https://github.com/dotnet/roslyn-analyzers/blob/master/src/Microsoft.CodeAnalysis.BannedApiAnalyzers/Core/SymbolIsBannedAnalyzer.cs | |
[DiagnosticAnalyzer(LanguageNames.CSharp)] |
$userPath = $env:USERPROFILE | |
$pathExclusions = New-Object System.Collections.ArrayList | |
$processExclusions = New-Object System.Collections.ArrayList | |
$pathExclusions.Add('C:\Windows\Microsoft.NET') > $null | |
$pathExclusions.Add('C:\Windows\assembly') > $null | |
$pathExclusions.Add($userPath + '\Downloads\HeidiSQL_11.3_64_Portable') > $null | |
$pathExclusions.Add($userPath + '\.dotnet') > $null |
/** | |
* Code largely taken from http://blogs.msdn.com/b/icumove/archive/2009/01/31/working-with-fips-in-net-c.aspx?Redirected=true | |
*/ | |
using System; | |
using System.Security.Cryptography; | |
using System.Reflection; | |
namespace FipsTest { | |
class Program { |
# Run this as Administrator | |
net stop w3svc | |
Get-ChildItem "C:\Windows\Microsoft.NET\Framework*\v*\Temporary ASP.NET Files" -Recurse | Remove-Item -Recurse -Force | |
net start w3svc |
// Implementation | |
function internalizeTextFiles(type, html, callback) { | |
var tagNames = { | |
js: 'script', | |
css: 'style' | |
} | |
var tagName = tagNames[type]; | |
var $html = $(html); | |
var $assets = $html.filter(tagName); | |
var fetchedCounter = 0; |
using System; | |
using System.Threading.Tasks; | |
using PuppeteerSharp; | |
using Xunit; | |
namespace PuppeteerSharp.Documentation | |
{ | |
public class Examples | |
{ | |
[Fact] |
This file was generated automatically based on this two sources:
This is a JSON object by following structure:
[string ext] : {
signs: [sign]
using System; | |
using Mono.Unix; | |
using Mono.Unix.Native; | |
using System.Configuration; | |
using ServiceStack; | |
using ServiceStack.Web; | |
using System.IO; | |
using ServiceStack.Host.HttpListener; | |
using System.Net; |