Skip to content

Instantly share code, notes, and snippets.

View devinceble's full-sized avatar
💭
I may be slow to respond.

Leivince John Marte devinceble

💭
I may be slow to respond.
View GitHub Profile
@devinceble
devinceble / profile
Last active August 29, 2015 14:24 — forked from garthk/profile
wait4eth1() {
CNT=0
until ip a show eth1 | grep -q UP
do
[ $((CNT++)) -gt 60 ] && break || sleep 1
done
sleep 1
}
wait4eth1
@devinceble
devinceble / sets.json
Created February 17, 2016 07:40 — forked from justincron/sets.json
Bootstrap Grid for GuideGuide
{"Default":{"name":"Default","sets":{"469eb8921edf75ed3360d5838f9585c0d7a82109":{"name":"Outline","string":"| ~ | (vFl)\n| ~ | (hFl)","id":"469eb8921edf75ed3360d5838f9585c0d7a82109"},"84676cd434499994ef5176c93d970e83079cbc6c":{"name":"Two column grid","string":"| ~ | ~ | (vFl)","id":"84676cd434499994ef5176c93d970e83079cbc6c"},"d521212626e4f9f144821a52dcdaf3e1f6c8cffd":{"name":"Three column grid","string":"| ~ | ~ | ~ | (vFl)","id":"d521212626e4f9f144821a52dcdaf3e1f6c8cffd"},"836d2a54511793c6f2ecdd3447f1c727e3c83925":{"name":"1170px Grid | 1570","string":"$v = | 65px | 15px | 15px |\n$vC = | 65px |\n200px | 15px | 15px | $v*11 | $vC | 15px | 15px | 200px ( vlp, | ~ )","id":"836d2a54511793c6f2ecdd3447f1c727e3c83925"},"8d6acf586750142b4cb4bb4b6f33244211159eb9":{"name":"970px Grids | 1370","string":"$v = | 48px | 15px | 15px |\n$vC = | 48px |\n200px | 17px | 15px | $v*11 | $vC | 15px | 17px | 200px ( vlp, | ~ )","id":"8d6acf586750142b4cb4bb4b6f33244211159eb9"},"544118008c2af25e65d782c499fbe42480cf8915":{"name":"7
@devinceble
devinceble / how_to_gen_ssl_cert.md
Created February 17, 2016 14:22 — forked from iansheridan/how_to_gen_ssl_cert.md
How to generate an SSL CSR or self signed SSL certificate

How to generate an SSL CSR or self signed SSL certificate

Overview

The following is an extremely simplified view of how SSL is implemented and what part the certificate plays in the entire process.

Normal web traffic is sent unencrypted over the Internet. That is, anyone with access to the right tools can snoop all of that traffic. Obviously, this can lead to problems, especially where security and privacy is necessary, such as in credit card data and bank transactions. The Secure Socket Layer is used to encrypt the data stream between the web server and the web client (the browser).

SSL makes use of what is known as asymmetric cryptography, commonly referred to as public key cryptography (PKI). With public key cryptography, two keys are created, one public, one private. Anything encrypted with either key can only be decrypted with its corresponding key. Thus if a message or data stream were encrypted with the server's private key, it can be decrypted only using its corresponding public key, ensuring

Effective Engineer - Notes

What's an Effective Engineer?

  • They are the people who get things done. Effective Engineers produce results.

Adopt the Right Mindsets