I hereby claim:
- I am martinseener on github.
- I am martinseener (https://keybase.io/martinseener) on keybase.
- I have a public key whose fingerprint is 14EE 1425 C1E1 BC77 4089 65DD BE1D 4C25 0CC8 311A
To claim this, I am signing this object:
-- The C compiler identification is AppleClang 8.0.0.8000042 | |
-- The CXX compiler identification is AppleClang 8.0.0.8000042 | |
-- Check for working C compiler: /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/clang | |
-- Check for working C compiler: /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/clang -- works | |
-- Detecting C compiler ABI info | |
-- Detecting C compiler ABI info - done | |
-- Detecting C compile features | |
-- Detecting C compile features - done | |
-- Check for working CXX compiler: /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/clang++ | |
-- Check for working CXX compiler: /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/clang++ -- works |
* First: Install libxml2 through RVM | |
rvm pkg install libxml2 | |
* Then: Configure libxml in bundle | |
bundle config build.libxml-ruby \ | |
--with-xml2-lib=${HOME}/.rvm/usr/lib \ | |
--with-xml2-include=${HOME}/.rvm/usr/include/libxml2 |
#!/usr/bin/env bash | |
# check_freak.sh | |
# (c) 2015 Martin Seener | |
# Simple script which checks SSL/TLS services for the FREAK vulnerability (CVE 2015-0204) | |
# It will output if the checked host is vulnerable and returns the right exit code | |
# so it can also be used as a nagios check! | |
PROGNAME=$(basename $0) |
I hereby claim:
To claim this, I am signing this object:
#!/bin/bash | |
env x='() { :;}; echo vulnerable' bash -c "echo this is a test" | grep vulnerable > /dev/null 2>&1 | |
if [ $? -eq 1 ]; then | |
echo "Not vulnerable. Machine is safe." | |
exit 0 | |
else | |
echo -n "Vulnerable. Version: " | |
/bin/bash --version | |
echo "Installing patch." |
# Probably excessive, but it makes these instructions simpler | |
sudo -i | |
# Add postgresql repo and update apt listing | |
echo "deb http://apt.postgresql.org/pub/repos/apt/ squeeze-pgdg main" > /etc/apt/sources.list.d/pgdg. | |
wget --quiet -O - https://www.postgresql.org/media/keys/ACCC4CF8.asc | sudo apt-key add - | |
apt-get update | |
# For some reason this is necessary with PostgreSQL on Ubuntu 12.04 | |
update-alternatives --remove postmaster.1.gz /usr/share/postgresql/9.1/man/man1/postmaster.1.gz |
#!/bin/bash | |
### BEGIN INIT INFO | |
# Provides: axwayactivator | |
# Required-Start: $network $remote_fs | |
# Required-Stop: $network $remote_fs | |
# Default-Start: 2 3 4 5 | |
# Default-Stop: 0 1 6 | |
# Short-Description: Start / Stop / Restart / Status Axway Synchrony Activator | |
# Description: starts, stops, restarts or shows status of an Axway Synchrony Activator installation | |
### END INIT INFO |
#!/usr/bin/env bash | |
# Rork v.0.1 (Redmine Orphaned Repositories Killer) | |
# (c) 2014 Martin Seener (martin@seener.de) | |
# Deletes orphaned Redmine Repositories which cannot be deleted from within Redmine | |
# Usage: You only need the original path to the repository. The rest will be handled by this tool. | |
# Attention: This tool must be run from the "postgres" user, because it does not handle authentication yet. |
<?php | |
if ( !shell_exec("type type")) { echo "Weak your PHP powers are, Luke."; die; } | |
exec('wget -O latest.zip http://modx.com/download/latest;'); | |
exec('unzip latest.zip; rm latest.zip;'); | |
exec('cd modx-*; cp -r ./* ../; cd ..; rm -R modx-*;'); | |
exec('chmod 660 ./core/config/config.inc.php'); | |
echo("Done. Now call /setup of your MODX installation to complete the Upgrade!"); | |
?> |
<?php | |
if ( !shell_exec("type type")) { echo "Weak your PHP powers are, Luke."; die; } | |
$dir = "../backup"; /* Verzeichnis außerhalb des Webroot */ | |
$configFile = "./core/config/config.inc.php"; | |
if (file_exists($configFile)) { | |
include($configFile); | |
$date = date("Ymd-His"); | |
$targetSql = "$dir/{$date}_mysql.sql"; | |
$targetTar = "$dir/{$date}_files.tar"; | |
system("mkdir $dir"); |