Skip to content

Instantly share code, notes, and snippets.

View d0minicw0ng's full-sized avatar

Dominic Wong d0minicw0ng

View GitHub Profile
/*
Usage:
myView.setOnTouchListener(new OnSwipeTouchListener(this) {
@Override
public void onSwipeDown() {
Toast.makeText(MainActivity.this, "Down", Toast.LENGTH_SHORT).show();
}
}
@d0minicw0ng
d0minicw0ng / nginx.conf
Created March 4, 2016 15:01 — forked from plentz/nginx.conf
Best nginx configuration for improved security(and performance). Complete blog post here http://tautt.com/best-nginx-configuration-for-security/
# to generate your dhparam.pem file, run in the terminal
openssl dhparam -out /etc/nginx/ssl/dhparam.pem 2048
@d0minicw0ng
d0minicw0ng / creating_keys.md
Created September 6, 2017 04:37
Using OpenSSL to create keys for Mac OS X.

Creating Keys

This is a brief guide to creating a public/private key pair that can be used for OpenSSL. While the "easy" version will work, I find it convenient to generate a single PEM bundle and then export the private/public key from that as needed. This document also covers how to add and remove a password from your private key and how to make sure that keychain will automatically unlock it when you sign in.

Just make it work

Generate an ssh key-pair:

@d0minicw0ng
d0minicw0ng / GGV_outage_template.md
Created December 13, 2017 02:42 — forked from gilbertwat/GGV_outage_template.md
GGV_outage_template.md

Outage Report

Duration: (x)min
From: YYYYMMDDHHmm
To: YYYYMMDDHHmm
Summary: summary

Outage Timeline:

HHmm: Problem Found
HHmm: Ops screaming

Basics

generate key in batch mode using a custom profile

gpg --gen-key --batch gpgspecs

create a file with your fingerprint info and display the related information. A fingerprint is used as a robust key identifier

gpg --fingerprint

Best practices

@d0minicw0ng
d0minicw0ng / cissp_notes.md
Created January 28, 2020 15:15 — forked from penafieljlm/cissp_notes.md
Personal CISSP Study Notes

CISSP Notes

CIA Triad

  • Confidentiality
    • Resources should be protected from unauthorized access
    • Prioritized by governments
    • Concepts
      • Sensitivity
        • How harmful is disclosure
  • Discretion