brew install gpg
brew install pinentry-mac
brew install --cask gpg-suite
brew install --cask keybase
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<html> | |
<head> | |
<style> | |
textarea { | |
height: 300px; | |
width: 100%; | |
} | |
</style> | |
<script type="text/javascript"> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
// Disable pingback.ping xmlrpc method to prevent Wordpress from participating in DDoS attacks | |
// More info at: https://docs.bitnami.com/?page=apps&name=wordpress§ion=how-to-re-enable-the-xml-rpc-pingback-feature | |
// remove x-pingback HTTP header | |
add_filter('wp_headers', function($headers) { | |
unset($headers['X-Pingback']); | |
return $headers; | |
}); | |
// disable pingbacks |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
UPDATE wp_options SET option_value = replace(option_value, 'http://thismagicday.com.192.168.1.15.xip.io', 'http://thismagicday.com') WHERE option_name = 'home' OR option_name = 'siteurl'; | |
UPDATE wp_posts SET guid = replace(guid, 'http://thismagicday.com.192.168.1.15.xip.io','http://www.thismagicday.com'); | |
UPDATE wp_posts SET post_content = replace(post_content, 'http://thismagicday.com.192.168.1.15.xip.io', 'http://thismagicday.com'); | |
UPDATE wp_postmeta SET meta_value = replace(meta_value,'http://thismagicday.com.192.168.1.15.xip.io','http://thismagicday.com'); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
//Do Download Headers if we have nothing else to show | |
if($uri_page[$no] == 'export'){ | |
//Universal | |
ini_set('zlib.output_compression','Off'); | |
if($uri_page[$no+1] == 'csv'){ | |
//CSV | |
header('Content-Encoding: UTF-8'); | |
header('Content-type: text/csv; charset=UTF-8'); |
I hereby claim:
- I am koconder on github.
- I am zuperduper (https://keybase.io/zuperduper) on keybase.
- I have a public key ASBS0nvfhG7bTHtCVfLmGXDw1WPAMVHe9_LSS0q_eF5RKQo
To claim this, I am signing this object:
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
//Error Checking | |
error_reporting(E_ALL); | |
ini_set('display_errors', '1'); | |
//Set User domain extention | |
$LDAPUserDomain = "@my.domain"; //Needs the @, but not always the same as the LDAP server domain | |
?><form name="input" action="ldap.php" method="post"> | |
Username: <input type="text" name="u"> <?php echo $LDAPUserDomain;?><br /> | |
Password: <input type="password" name="p"> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import pandas as pd | |
import hashlib | |
# Load the csv file into a pandas DataFrame | |
df = pd.read_csv('filename.csv') | |
# Define a function to hash a string | |
def hash_for_google(input): | |
if pd.isnull(input): | |
return None |
Use the following clean-up scripts to help locate redundant queries, widgets, dashboards and alerts within Redash. This was mostly to keep lineage lean and reduce discovery of redundant reports and data:
- locate_expired_assets.sql - Finds expired queries and other assets downstream from that query
- locate_expired_dashboards.sql - Finds unused dashboards older than 1 year
- locate_expired_alerts.sql - Finds unused alerts not executed older than 1 year
- locate_expired_users.sql - Finds unused users not logged older than 90 days
- locate_insecure_tokens.sql - Finds API tokens older than 90 days still in use
- locate_orphaned_connections.sql - Finds orphaned data connections with no queries