sysctl -a | grep swap
$ sudo pkill -HUP -u _windowserver
from scapy.all import DHCP_am | |
from scapy.base_classes import Net | |
dhcp_server = DHCP_am(iface='eth1', domain='example.com', | |
pool=Net('192.168.10.0/24'), | |
network='192.168.10.0/24', | |
gw='192.168.10.254', | |
renewal_time=600, lease_time=3600) | |
dhcp_server() |
#define _XOPEN_SOURCE 700 | |
#include <signal.h> | |
#include <unistd.h> | |
int main() | |
{ | |
sigset_t set; | |
int status; | |
if (getpid() != 1) return 1; |
I am hoping to save a few hours for people like me who have a modem + router setup and switched to NOW TV ISP.
Extract Client ID and Vendor Class ID from DHCP handshake
Configuration for HG 612
import cv2 | |
import numpy as np | |
def deskew(im, max_skew=10): | |
height, width = im.shape | |
# Create a grayscale image and denoise it | |
im_gs = cv2.cvtColor(im, cv2.COLOR_BGR2GRAY) | |
im_gs = cv2.fastNlMeansDenoising(im_gs, h=3) |
/***************************************** | |
* Read QSee/Zmodo cameras * | |
* Forward stream to FIFO pipe * | |
* Author: Daniel Osborne * | |
* Based on IP Cam Viewer by Robert Chou * | |
* License: Public Domain * | |
*****************************************/ | |
/* Version history | |
* 0.41 - 2013-05-03 |
class AndroidXMLDecompress(): | |
endDocTag = 0x00100101 | |
startTag = 0x00100102 | |
endTag = 0x00100103 | |
def decompressXML(self, xml: bytearray) -> str: | |
finalXml = str() | |
numbStrings = self.LEW(xml, 4*4) |
You don't need a Mac to do this :-)
For generating PKPass files, you'll need 4 things after this tutorial:
#!/usr/bin/env python3 | |
# Joonas Kuorilehto 2013 | |
# This script is Public Domain. | |
import csv | |
import subprocess | |
import pipes | |
from datetime import datetime | |
import smtplib |