This a collection of interesting links found in The Imposter's Handbook by Rob Conery.
Content:
| -module(first). | |
| -export([double/1, mult/2, area/3, treble/1, square/1]). | |
| mult (X,Y) -> | |
| X*Y. | |
| double(X) -> | |
| mult(2,X). | |
| area(A,B,C) -> |
| Ansible playbook to setup HTTPS using Let's encrypt on nginx. | |
| The Ansible playbook installs everything needed to serve static files from a nginx server over HTTPS. | |
| The server pass A rating on [SSL Labs](https://www.ssllabs.com/). | |
| To use: | |
| 1. Install [Ansible](https://www.ansible.com/) | |
| 2. Setup an Ubuntu 16.04 server accessible over ssh | |
| 3. Create `/etc/ansible/hosts` according to template below and change example.com to your domain | |
| 4. Copy the rest of the files to an empty directory (`playbook.yml` in the root of that folder and the rest in the `templates` subfolder) |
This a collection of interesting links found in The Imposter's Handbook by Rob Conery.
Content:
| —– BEGIN LICENSE —– | |
| Die Socialisten GmbH | |
| 10 User License | |
| EA7E-800613 | |
| 51311422 E45F49ED 3F0ADE0C E5B8A508 | |
| 2F4D9B65 64E1E244 EDA11F0E F9D06110 | |
| B7B2E826 E6FDAA72 2C653693 5D80582F | |
| 09DCFFB5 113A940C 5045C0CD 5F8332F8 | |
| 34356CC6 D96F6FDB 4DEC20EA 0A24D83A | |
| 2C82C329 E3290B29 A16109A7 EC198EB9 |
| Login Password | |
| root xmhdipc | |
| root klv123 | |
| root xc3511 | |
| root 123456 | |
| root jvbzd | |
| default OxhlwSG8 | |
| defaul tlJwpbo6 | |
| defaul S2fGqNFs | |
| root hi3518 |
$ uname -r
| install latest crmpoint fw per: | |
| https://community.ui.com/questions/Installing-airControl-on-CRM-Point/a4f1fdcd-114a-4c06-a842-e56eff486570 | |
| # login via ssh | |
| # change root/ubnt password | |
| passwd | |
| # fix jessie backports repo | |
| echo "deb http://archive.debian.org/debian jessie-backports main" >> /etc/apt/sources.list |
This GitHub Gist details the manual configuration needed on a UniFi controller to enable IPv6 tunneling with Hurricane Electric's Tunnelbroker service.
This is what works for me personally. Stuff you'll need to do to adapt this to your ends:
| import asyncio | |
| import random | |
| import time | |
| async def worker(name, queue): | |
| while True: | |
| # Get a "work item" out of the queue. | |
| sleep_for = await queue.get() |
Download the latest ugw3 package from https://github.com/Lochnair/vyatta-wireguard/releases and install it on your USG using dpkg -i wireguard-ugw3-<version>.deb.
cd /config/auth
umask 077
mkdir wireguard
cd wireguard
wg genkey > wg_private.key
wg pubkey < wg_private.key > wg_public.key