I hereby claim:
-
I am majal on github.
-
I am majal (https://keybase.io/majal) on keybase.
-
I have a public key ASCiOS7PtuG9fxXfkHZxD5vU7VTnTNATxqGB0lH9bbgulgo
#!/bin/bash | |
[[ -z "$1" ]] && echo "Please enter a filename. Exiting..." | |
[[ -z "$1" ]] && exit 1 | |
echo | |
printf "Stripping annotations from $1... " | |
pdftk "$1" output "/tmp/$1 - uncompressed.pdf" uncompress | |
LANG=C sed -n '/^\/Annots/!p' "/tmp/$1 - uncompressed.pdf" > "/tmp/$1 - stripped.pdf" |
#!/bin/bash | |
# Sign and load VirtualBox modules | |
# https://www.majlovesreg.one/tag/code/ | |
# https://www.majlovesreg.one/thoughts/sign-virtualbox-on-ubuntu-16-04-with-secure-boot-enabled/ | |
# Run as root | |
[ "`whoami`" = root ] || exec sudo "$0" "$@" | |
# Set working directory | |
dir=/home/directory/of/keys |
#!/bin/bash | |
# https://www.majlovesreg.one/tag/code/ | |
# https://www.majlovesreg.one/adding-brotli-to-a-running-nginx-instance | |
# For custom NGINX version, use: | |
# ngver=1.14.2 | |
# For automated detection of installed NGINX, use: | |
ngver=$(nginx -v 2>&1 | grep -oP '(?<=/).*') |
I hereby claim:
I am majal on github.
I am majal (https://keybase.io/majal) on keybase.
I have a public key ASCiOS7PtuG9fxXfkHZxD5vU7VTnTNATxqGB0lH9bbgulgo
#!/bin/bash | |
# https://www.majlovesreg.one/tag/code/ | |
# Made for betanet, can be edited for other networks | |
instances=$(pgrep -xc $(basename "$0")) | |
[ "${instances}" ] && [ ${instances} -gt 1 ] && { echo "Multiple instances found, exiting..."; exit 0; } | |
source $HOME/.profile | |
export NVM_DIR="$HOME/.nvm" |
#!/bin/bash | |
# https://www.majlovesreg.one/tag/code/ | |
# Made for betanet, can be edited for other networks | |
instances=$(pgrep -xc $(basename "$0")) | |
[ "${instances}" ] && [ ${instances} -gt 1 ] && { echo "Multiple instances found, exiting..."; exit 0; } | |
source $HOME/.profile | |
export NVM_DIR="$HOME/.nvm" |
#!/bin/bash | |
# https://www.majlovesreg.one/tag/code/ | |
height=224300 | |
cdir='/home/majlovesreg/certik' # change to match your user directory | |
newv="${cdir}/v0.13.4-shentu-rts-broken" # the binaries should have been downloaded in advance to this directory | |
confdir='/home/majlovesreg/.certikd/config' # change to match your user directory | |
clidir='/home/majlovesreg/.certikcli/config' # change to match your user directory | |
oldchain='shentu-rts' |
There is an increasing count of applications which use Authy for two-factor authentication. However many users who aren't using Authy, have their own authenticator setup up already and do not wish to use two applications for generating passwords.
Since I use 1Password for all of my password storing/generating needs, I was looking for a solution to use Authy passwords on that. I couldn't find any completely working solutions, however I stumbled upon a gist by Brian Hartvigsen. His post had a neat code with it to generate QR codes for you to use on your favorite authenticator.
His method is to extract the secret keys using Authy's Google Chrome app via Developer Tools. If this was not possible, I guess people would be reverse engineering the Android app or something like that. But when I tried that code, nothing appeared on the screen. My guess is that Brian used the
#!/bin/bash | |
# Multicore minterpolate in ffmpeg | |
# Just slice & process & concat | |
# NB: The concat points between slices may be weird | |
# Default arguments | |
ff=/usr/bin/ffmpeg | |
fps=60 | |
dur=00:00:10 |