Source: StackOverflow
With a Linux Guest run this:
sudo dd if=/dev/zero | pv | sudo dd of=/bigemptyfile bs=4096k
sudo rm -rf /bigemptyfile
{ | |
��������������������������ͻ | |
�Simonas Kareiva � | |
� 2000 12 22 6:30 AM � | |
� PinGPonG v0.01 � | |
� questions:molotov@mp3.lt � | |
��������������������������ͼ | |
} | |
program pingpong; | |
uses Crt, ptcgraph; |
<!-- contents of render-image.html --> | |
{{- $link := split .Destination "#" }} | |
{{- $image := (.Page.Resources.ByType "image").GetMatch (printf "*%s*" (index $link 0)) }} | |
{{- $logo := (resources.Get "images/logo.png") }} | |
{{- if and $image $logo }} | |
{{- $size := math.Round (mul $image.Height 0.25) }} | |
{{- $size := cond (ge $size 80) ($size) (80.0) }} | |
{{- $logo := $logo.Resize (printf "%.0fx jpg" $size) }} |
/* | |
* m1racle-poc: a basic proof of concept for the M1RACLES vulnerability in the Apple M1. | |
* | |
* This program allows you to read and write the state of the s3_5_c15_c10_1 CPU register. | |
* | |
* Please visit m1racles.com for more information. | |
* | |
* Licensed under the MIT license. | |
*/ |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"rds-db:connect" | |
], | |
"Resource": [ | |
"arn:aws:rds-db:region:account-id:dbuser:dbi-resource-id/database-user-name" |
[ | |
"Abarth", | |
"Alfa Romeo", | |
"Aston Martin", | |
"Audi", | |
"Bentley", | |
"BMW", | |
"Bugatti", | |
"Cadillac", | |
"Chevrolet", |
# requires WebSocket support with `a2enmod proxy_wstunnel` | |
# check https://ssl-config.mozilla.org/#server=apache&version=2.4.41&config=modern&openssl=1.1.1d&hsts=false&ocsp=false&guideline=5.6 for hardening security | |
<VirtualHost *:80 [::]:80> | |
ServerName peertube.example.com | |
ServerAdmin webmaster@example.com | |
Protocols h2c http/1.1 | |
RewriteEngine On | |
RewriteCond %{REQUEST_URI} !^/\.well\-known/acme\-challenge/ |
# wp-secure.conf | |
# | |
# | |
# This file includes common security considerations for wordpress using nginx. | |
# | |
# The goal is to block actions which are usually dangerous to wordpress. | |
# Additionally, we block direct access to PHP files and folders which should not | |
# be accessed directly from a browser. | |
# | |
# Also have included exceptions for plugins that are known to require this access. |
Source: StackOverflow
With a Linux Guest run this:
sudo dd if=/dev/zero | pv | sudo dd of=/bigemptyfile bs=4096k
sudo rm -rf /bigemptyfile