I hereby claim:
- I am geofferey on github.
- I am geofferey (https://keybase.io/geofferey) on keybase.
- I have a public key ASCJPOri7ZCDXpxJ7UVINNjqXDAg-pAm0fWeSYnc3j6VPgo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#!/bin/bash | |
## A simple session chooser for NX virtual desktops written using Zenity dialog boxes. | |
## Change the node.cfg default desktop to thid script | |
# DefaultDesktopCommand "/usr/bin/nx-session-choose.sh | |
## This script should easily be adaptable to suit ones needs. | |
sleep 4.5 | |
export NX_SESSION=1 |
/* | |
This is a simple patch that will allow Radeon graphics adapters to function in Linux VMs running under ESXi | |
File is located in drivers/gpu/drm/radeon/radeon_bios.c | |
*/ | |
//* Add this line after other includes | |
#include <linux/firmware.h> | |
//* Add this function to file | |
static bool radeon_read_bios_from_firmware(struct radeon_device *rdev) |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <string.h> | |
/* This extremely simple program allows users/accounts to enable and disable wakelocks on Android based devices by to writing arbitray strings to /sys/power/wake_lock & /sys/power/wake_unlock. | |
Use case: | |
On my device I am running a service inside of a chroot as a system account. Because said service runs under a restrictive account and not root it can not write to /sys/power/wake_* even when adding the sys account to the aid_wakelock Adroid group. Instead of stupidly allowing a system account to run commands as root using sudo or some other means that would almost certainly grant more capabilities than required I wrote this program. |
#!/bin/sh -e | |
PATH=$PATH:/usr/sbin:/usr/bin | |
hostname=somehost@v6.army | |
device=$2 | |
token=blahblah | |
file=/tmp/.dynv6.addr6 | |
bind_ip=192.0.0.1 |
### | |
### ejabberd configuration file | |
### | |
### The parameters used in this configuration file are explained at | |
### | |
### https://docs.ejabberd.im/admin/configuration | |
### | |
### The configuration file is written in YAML. | |
### ******************************************************* | |
### ******* !!! WARNING !!! ******* |
#!/bin/bash | |
## This up script only serves as an example and | |
# will need to be customized to ones needs. | |
## Sets up an internet capable OpenVPN tunnel | |
# from within a debian chroot running under | |
# android. | |
## For more info on APP UIDs for |
#!/bin/sh | |
export ARCH=arm64 | |
if [ $(whoami) != root ]; then | |
echo "You should probably be running me as root!" | |
export RUN_AS_ROOT=sudo |
--- arch/arm64/boot/dts/qcom/sc7180-trogdor.dtsi 2022-04-27 05:41:17.000000000 -0700 | |
+++ arch/arm64/boot/dts/qcom/sc7180-trogdor.dtsi 2022-05-03 23:07:40.851897877 -0700 | |
@@ -276,18 +276,6 @@ | |
#address-cells = <1>; | |
#size-cells = <0>; | |
- dai-link@0 { | |
- link-name = "MultiMedia0"; | |
- reg = <MI2S_PRIMARY>; | |
- cpu { |
@ECHO OFF | |
REM Original thread detailing solution and requirement for this wrapper can be found below: | |
REM https://social.technet.microsoft.com/Forums/en-US/9e56a51c-42fa-4f17-afe2-78b8c5e90fcf/error-0x80070522?forum=mdopmbam | |
SET DomainName=netlabwork.us | |
\\%DomainName%\SYSVOL\%DomainName%\bin\psexec.exe -accepteula -s cmd /C PowerShell -NoProfile -NonInteractive -ExecutionPolicy ByPass \\%DomainName%\SYSVOL\%DomainName%\scripts\bitlocker-activator.ps1 > "%TEMP%\BitLockerEnablerWrapper.log" 2>&1 |