Skip to content

Instantly share code, notes, and snippets.

cyberis /
Last active October 24, 2021 01:06
Opening IP Excluded Ports In Windows

I was having some real problems with CLI's not being able to open local ports to perform tasks that communicate with cloud services. In the current case, whenever I tried to authorize a Salesforce Org for use with the sfdx cli, I was getting an access permissions error:

`$ sf login org -l Error: listen EACCES: permission denied at Server.setupListenHandle [as _listen2] (net.js:1303:21) at listenInCluster (net.js:1368:12) at GetAddrInfoReqWrap.doListen [as callback] (net.js:1505:7) at GetAddrInfoReqWrap.onlookup [as oncomplete] (dns.js:71:8) { code: 'EACCES',

cyberis /
Created December 11, 2019 21:10 — forked from mattrude/
A simple script build for Ubuntu to download and install the current version of GnuPG.
# ---------
# Script to build and install GnuPG 2.2.x
cyberis /
Last active July 1, 2019 16:09
My Favorite Git Aliases

My Favorite Git Aliases

I use git alot since I prefer the command line for improving developer velocity. A part of that is configuring the tool to do whatever tricks it offers to reduce typing and increase usability. Git is great tool for CVS but sometimes there is a lot to remmeber and a lot to type. Thankfully, git allows you to create aliases for your favorite, most used, or most lengthy commands. Git aliases can even take parameters. So here are few so I don't have to look them up any more.

Git Status Without All the Verbiage (The s Alias)

The git status command produces an aweful lot of output, much of it only interesting to the newbie or under special circumstances (like when you are a bit lost in the code). Observe:

cyberis /
Created February 14, 2018 13:48 — forked from joepie91/
Don't use VPN services.

Don't use VPN services.

No, seriously, don't. You're probably reading this because you've asked what VPN service to use, and this is the answer.

Note: The content in this post does not apply to using VPN for their intended purpose; that is, as a virtual private (internal) network. It only applies to using it as a glorified proxy, which is what every third-party "VPN provider" does.

(A Russian translation of this article can be found here, contributed by Timur Demin.)

Why not?

Keybase proof

I hereby claim:

  • I am cyberis on github.
  • I am cyberis ( on keybase.
  • I have a public key whose fingerprint is EDDB FD7F 5405 364D CBCE AE20 7817 58BA 0BAB 0FBB

To claim this, I am signing this object:

cyberis /
Last active August 29, 2015 14:17 — forked from klange/

Since this is on Hacker News...

  • No, I don't distribute my résumé like this. A friend of mine made a joke about me being the kind of person who would do this, so I did (the link on that page was added later).
  • I apologize for the use of _t in my types. I spend a lot of time at a level where I can do that; "reserved for system libraries? I am the system libraries".
  • They're all while loops because shut up, you're overthinking a joke. Same for the const correctness.
  • My use of type * name is entirely intentional.