- Web Wormhole https://webwormhole.io/ https://github.com/saljam/webwormhole
- ToffeeShare https://toffeeshare.com/
- FilePizza https://file.pizza/
- ShareDrop https://www.sharedrop.io/ https://github.com/szimek/sharedrop
- A clone SnapDrop https://snapdrop.net/ https://github.com/RobinLinus/snapdrop
- A fork PairDrop https://pairdrop.net/ https://github.com/schlagmichdoch/pairdrop
- A clone SnapDrop https://snapdrop.net/ https://github.com/RobinLinus/snapdrop
- Instant.io https://instant.io/
- FileTC https://file.tc/
foo: bar |
aka what i did to get from nothing to done.
note: these are designed to be primarily a re-install guide for myself (writing things down helps me memorize the knowledge), as such don't take any of this on blind faith - some areas are well tested and the docs are very robust, some items, less so). YMMV
# -------------------------------------------------------------------- | |
# Recursively find pdfs from the directory given as the first argument, | |
# otherwise search the current directory. | |
# Use exiftool and qpdf (both must be installed and locatable on $PATH) | |
# to strip all top-level metadata from PDFs. | |
# | |
# Note - This only removes file-level metadata, not any metadata | |
# in embedded images, etc. | |
# | |
# Code is provided as-is, I take no responsibility for its use, |
Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-2021-44228)
- If you want to add a link, comment or send it to me
- Feel free to report any mistake directly below in the comment or in DM on Twitter @SwitHak
- Royce Williams list sorted by vendors responses Royce List
- Very detailed list NCSC-NL
- The list maintained by U.S. Cybersecurity and Infrastructure Security Agency: CISA List
#TLS Setting | |
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 | |
#Trust PowerShell Gallery - this will avoid you getting any prompts that it's untrusted | |
Set-PSRepository -Name 'PSGallery' -InstallationPolicy Trusted | |
#Install NuGet | |
Install-PackageProvider -name NuGet -Force | |
#Install Module |
Follow these steps to install Proxmox VE on a Hetzner server via the Rescue System. The Rescue System is a Linux-based environment that can be booted into to perform system recovery tasks. We'll be using it to install Proxmox VE.
In order to complete the process, it is indeed necessary to first boot into the Rescue System and then connect to it via SSH. This will allow you to run the commands for installing Proxmox VE. Here are the steps:
- Log into the Hetzner Robot.
- Under "Main Functions; Server" select the desired server and then open the tab "Rescue".
#!/bin/bash | |
set -o errexit | |
clear | |
printf "\n*** This script will download a cloud image and create a Proxmox VM template from it. ***\n\n" | |
### HOW TO USE | |
### Pre-req: | |
### - run on a Proxmox 6 server | |
### - a dhcp server should be active on vmbr1 |
' // *************************************************************************** | |
' // | |
' // Copyright (c) Microsoft Corporation. All rights reserved. | |
' // | |
' // Microsoft Deployment Toolkit Solution Accelerator | |
' // | |
' // File: DeployWiz_Initialization.vbs | |
' // | |
' // Version: 6.3.8450.1000-ocelotsloth-1.0 | |
' // |
District Judge Margot Coleman has ruled that computers seized by the NCA in 2013 should not be returned to British Finnish computer scientist Lauri Love.
Love, who brought the case under the 1897 Police Property Act, said:
"Although the court has not in this instance exercised its discretion in my favour, I am thankful to have had a hearing and the opportunity to submit the issues in question to the consideration of the law. Sometimes applications to resolve tedious and stressful states of affairs are