slmgr /ipk your_license_key
Replace your_license_key
with following volumn license keys according to Windows Edition:
I liked the way Grokking the coding interview organized problems into learnable patterns. However, the course is expensive and the majority of the time the problems are copy-pasted from leetcode. As the explanations on leetcode are usually just as good, the course really boils down to being a glorified curated list of leetcode problems.
So below I made a list of leetcode problems that are as close to grokking problems as possible.
#!/usr/bin/env bash | |
set -e | |
# dont add pipefail because we need to catch exit code inside pipe | |
MISSING_VAR_MESSAGE='must be running inside atlantis' | |
: "${ATLANTIS_TERRAFORM_VERSION:?$MISSING_VAR_MESSAGE}" | |
: "${DIR:?$MISSING_VAR_MESSAGE}" |
# Swap to free repo | |
wget -qO- https://gitlab.com/shebang/bashengine/raw/master/root/proxmox/aptfix | bash | |
apt update | |
apt upgrade -y | |
apt dist-upgrade -y | |
# Remove Nag. (Needs to be done after most upgrades that impact pve-manager) | |
cat <<EOF > /etc/apt/apt.conf.d/80pvenagfix |
const MY_DOMAIN = "agodrich.com" | |
const START_PAGE = "https://www.notion.so/gatsby-starter-notion-2c5e3d685aa341088d4cd8daca52fcc2" | |
const DISQUS_SHORTNAME = "agodrich" | |
addEventListener('fetch', event => { | |
event.respondWith(fetchAndApply(event.request)) | |
}) | |
const corsHeaders = { | |
"Access-Control-Allow-Origin": "*", |
Recently, news broke about a new possible offline attack on WPA2 using PMKID. To summarize the attack, WPA2 protected APs can end up broadcasting PMKID values which can then be used to offline-brute-force the password.
These PMKID values are computed this way:
PMKID = HMAC-SHA1-128(PMK, "PMK Name" | MAC_AP | MAC_STA)
This guide has moved to a GitHub repository to enable collaboration and community input via pull-requests.
https://github.com/alexellis/k8s-on-raspbian
Alex
# src: http://jonathannicol.com/blog/2013/11/19/automated-git-deployments-from-bitbucket/ | |
#~/.ssh/config | |
Host bitbucket.org | |
IdentityFile ~/.ssh/bitbucket_rsa | |
# clone project | |
git clone --mirror git@bitbucket.org:<username>/<repo-name>.git |
## Download the splunk universal forwarder | |
# Would probably need to login to splunk first. | |
wget -O splunkforwarder-6.3.3-f44afce176d0-linux-2.6-amd64.deb 'https://www.splunk.com/bin/splunk/DownloadActivityServlet?architecture=x86_64&platform=linux&version=6.3.3&product=universalforwarder&filename=splunkforwarder-6.3.3-f44afce176d0-linux-2.6-amd64.deb&wget=true' | |
## install | |
# It gets installed in /opt/splunkforwarder | |
sudo dpkg -i splunkforwarder-6.3.3-f44afce176d0-linux-2.6-amd64.deb | |
## add the entry to init.d |