-
Change keyboard layout:
loadkeys no
-
Verify boot mode:
ls /sys/firmware/efi/efivars
(If the directory exist your computer supports EFI)
-
Ping some site on the Internet to verify connection:
ping archlinux.org
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
# Copyright 2016 Massachusetts Institute of Technology | |
"""Extract images from a rosbag. | |
""" | |
import os | |
import argparse |
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
# Copyright 2016 Massachusetts Institute of Technology | |
# Tutorial : http://wiki.ros.org/rosbag/Code%20API#Python_API | |
""" | |
Extract images from a rosbag. | |
How to use: In terminal, cd DIRECTORY_OF_THIS_FILE and then type following | |
python bag_to_images.py --bag_file camera_odom_compressed.bag --output_dir output/ --image_topic '/camera/image_raw' | |
python bag_to_images.py --bag_file my_rosbag_file.bag --output_dir output/ --image_topic '/eGolf/front_cam/image_raw' |
to generate example certs | |
openssl req -x509 -nodes -days 365 -newkey rsa:1024 -keyout host.key -out host.crt | |
run server: | |
chmod +x server.py | |
./server.py | |
test server: | |
openssl s_client -connect localhost:8888 |
I tested the setup on Debian Stretch (naive installation) and Jessie (LinuxGSM installation). The setup should work on Debian 8 (Jessie), Debian 9 (Stretch) and Ubuntu (16.04). However, If you're running on Windows or other non-debian based Linux OS (e.g. CentOS, openSUSE), this guide doesn't apply to you.
I'm hosting FFA warm-up and HvH(soon) servers in San Francisco, welcome to join by:
IPv4: 159.89.154.137
Ipv6: 2604:a880:2:d0::20ad:2001
__author__ = "Farid Zakaria" | |
__copyright__ = "Copyright 2011, AMD" | |
__credits__ = ["Sherin Sasidhan (serin.s@gmail.com)"] | |
__license__ = "GPL" | |
__version__ = "1.0." | |
__maintainer__ = "Farid Zakaria" | |
__email__ = "farid.zakaria@amd.com" | |
__status__ = "Prototype" | |
import argparse |
wget https://www.openssl.org/source/openssl-1.1.1.tar.gz | |
tar -xvzf openssl-1.1.1.tar.gz | |
cd openssl-1.1.1/ | |
./Configure linux-aarch64 --prefix=/usr/local/ssl --openssldir=/usr/local/ssl shared zlib | |
make -j$(($(nproc)+1)) | |
sudo make install | |
sudo echo 'LD_LIBRARY_PATH=/usr/local/ssl/lib:${LD_LIBRARY_PATH}' >> /etc/environment | |
rm openssl-1.1.1.tar.gz | |
sudo rm openssl-1.1.1 -r |
#!/usr/bin/env python3 | |
# This script performs a GET and a POST request through HTTP/HTTPS using | |
# builtin python3 moudules. There is also a class to encode files for upload! | |
import urllib.request | |
import http.client | |
import mimetypes | |
import codecs | |
import uuid | |
import binascii |
<html> | |
<!-- You may need to download them from https://github.com/brix/crypto-js/tree/release-3.1.2/build --> | |
<script src="rollups/sha1.js"></script> | |
<script src='components/lib-typedarrays-min.js'></script> | |
<body> | |
<script> | |
function sha1sum() { | |
var oFile = document.getElementById('uploadFile').files[0]; | |
var sha1 = CryptoJS.algo.SHA1.create(); | |
var read = 0; |
Say you're running a virtual machine on your work computer. Say this machine, for whatever reason, can only connect to the internet over NAT - as in, it does not get it's own IP address. Say this VM is running a webserver, and you need a device outside of your computer to connect to it.
If only there was a way to get your work computer to 'share' it's network, so that you could get at that VM… Here's how you do it!
For all instructions, I assume your work computer is a mac