SSH into your EC2 instance. Run the following:
$ sudo yum install gcc
This may return an "already installed" message. That's OK.
$ wget http://download.redis.io/redis-stable.tar.gz && tar xvzf redis-stable.tar.gz && cd redis-stable && make
SSH into your EC2 instance. Run the following:
$ sudo yum install gcc
This may return an "already installed" message. That's OK.
$ wget http://download.redis.io/redis-stable.tar.gz && tar xvzf redis-stable.tar.gz && cd redis-stable && make
# create a datetimepicker cell when using backgrid and the bootstrap3-datetimepicker | |
# this can be modified to work with other datepicker libraries | |
# http://eonasdan.github.io/bootstrap-datetimepicker/ | |
# http://backgridjs.com/ | |
MyDatePickerCellEditor = Backgrid.InputCellEditor.extend( | |
events: {} | |
initialize: -> | |
Backgrid.InputCellEditor::initialize.apply this, arguments | |
input = this |
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>ANSIBlackColor</key> | |
<data> | |
YnBsaXN0MDDUAQIDBAUGFRZYJHZlcnNpb25YJG9iamVjdHNZJGFyY2hpdmVyVCR0b3AS | |
AAGGoKMHCA9VJG51bGzTCQoLDA0OVU5TUkdCXE5TQ29sb3JTcGFjZVYkY2xhc3NGMCAw | |
IDAAEAGAAtIQERITWiRjbGFzc25hbWVYJGNsYXNzZXNXTlNDb2xvcqISFFhOU09iamVj | |
dF8QD05TS2V5ZWRBcmNoaXZlctEXGFRyb290gAEIERojLTI3O0FITltiaWttcn2GjpGa |
# The command finds the most recent tag that is reachable from a commit. | |
# If the tag points to the commit, then only the tag is shown. | |
# Otherwise, it suffixes the tag name with the number of additional commits on top of the tagged object | |
# and the abbreviated object name of the most recent commit. | |
git describe | |
# With --abbrev set to 0, the command can be used to find the closest tagname without any suffix: | |
git describe --abbrev=0 | |
# other examples |
# flush existing rules | |
iptables -F | |
ip6tables -F | |
# ssh rule. always add this first ! | |
# TODO: Consider rate limiting? (e.g http://www.digitalsanctuary.com/tech-blog/debian/using-iptables-to-prevent-ssh-brute-force-attacks.html) | |
# Still need to read up on implications... | |
iptables -A INPUT -p tcp --dport ssh -j ACCEPT | |
iptables -A OUTPUT -p tcp --sport ssh -j ACCEPT |
$ uname -r
#!/bin/sh | |
# .git/hooks/commit-msg | |
test "" != "$(egrep '[A-Z]{3,}-\d+' "$1")" || { | |
echo >&2 Commit message requires JIRA code. | |
exit 1 | |
} |