chage –I -1 –m 0 –M 99999 –E -1 root
tdnf update
| # This script will manually rip out all VMware Tools registry entries and files for Windows 2008-2019 | |
| # Tested for 2019, 2016, and probably works on 2012 R2 after the 2016 fixes. | |
| # This function pulls out the common ID used for most of the VMware registry entries along with the ID | |
| # associated with the MSI for VMware Tools. | |
| function Get-VMwareToolsInstallerID { | |
| foreach ($item in $(Get-ChildItem Registry::HKEY_CLASSES_ROOT\Installer\Products)) { | |
| If ($item.GetValue('ProductName') -eq 'VMware Tools') { | |
| return @{ | |
| reg_id = $item.PSChildName; |
| using System; | |
| using System.Collections.Generic; | |
| using System.Collections.Immutable; | |
| using System.Linq; | |
| using Microsoft.CodeAnalysis; | |
| using Microsoft.CodeAnalysis.Diagnostics; | |
| using Microsoft.CodeAnalysis.Operations; | |
| // CREDIT: https://github.com/dotnet/roslyn-analyzers/blob/master/src/Microsoft.CodeAnalysis.BannedApiAnalyzers/Core/SymbolIsBannedAnalyzer.cs | |
| [DiagnosticAnalyzer(LanguageNames.CSharp)] |
| $userPath = $env:USERPROFILE | |
| $pathExclusions = New-Object System.Collections.ArrayList | |
| $processExclusions = New-Object System.Collections.ArrayList | |
| $pathExclusions.Add('C:\Windows\Microsoft.NET') > $null | |
| $pathExclusions.Add('C:\Windows\assembly') > $null | |
| $pathExclusions.Add($userPath + '\Downloads\HeidiSQL_11.3_64_Portable') > $null | |
| $pathExclusions.Add($userPath + '\.dotnet') > $null |
| /** | |
| * Code largely taken from http://blogs.msdn.com/b/icumove/archive/2009/01/31/working-with-fips-in-net-c.aspx?Redirected=true | |
| */ | |
| using System; | |
| using System.Security.Cryptography; | |
| using System.Reflection; | |
| namespace FipsTest { | |
| class Program { |
| # Run this as Administrator | |
| net stop w3svc | |
| Get-ChildItem "C:\Windows\Microsoft.NET\Framework*\v*\Temporary ASP.NET Files" -Recurse | Remove-Item -Recurse -Force | |
| net start w3svc |
| // Implementation | |
| function internalizeTextFiles(type, html, callback) { | |
| var tagNames = { | |
| js: 'script', | |
| css: 'style' | |
| } | |
| var tagName = tagNames[type]; | |
| var $html = $(html); | |
| var $assets = $html.filter(tagName); | |
| var fetchedCounter = 0; |
| using System; | |
| using System.Threading.Tasks; | |
| using PuppeteerSharp; | |
| using Xunit; | |
| namespace PuppeteerSharp.Documentation | |
| { | |
| public class Examples | |
| { | |
| [Fact] |
This file was generated automatically based on this two sources:
This is a JSON object by following structure:
[string ext] : {
signs: [sign]
| using System; | |
| using Mono.Unix; | |
| using Mono.Unix.Native; | |
| using System.Configuration; | |
| using ServiceStack; | |
| using ServiceStack.Web; | |
| using System.IO; | |
| using ServiceStack.Host.HttpListener; | |
| using System.Net; |