I hereby claim:
- I am martinseener on github.
- I am martinseener (https://keybase.io/martinseener) on keybase.
- I have a public key whose fingerprint is 14EE 1425 C1E1 BC77 4089 65DD BE1D 4C25 0CC8 311A
To claim this, I am signing this object:
#!/usr/bin/env bash | |
# Rork v.0.1 (Redmine Orphaned Repositories Killer) | |
# (c) 2014 Martin Seener (martin@seener.de) | |
# Deletes orphaned Redmine Repositories which cannot be deleted from within Redmine | |
# Usage: You only need the original path to the repository. The rest will be handled by this tool. | |
# Attention: This tool must be run from the "postgres" user, because it does not handle authentication yet. |
#!/bin/bash | |
### BEGIN INIT INFO | |
# Provides: axwayactivator | |
# Required-Start: $network $remote_fs | |
# Required-Stop: $network $remote_fs | |
# Default-Start: 2 3 4 5 | |
# Default-Stop: 0 1 6 | |
# Short-Description: Start / Stop / Restart / Status Axway Synchrony Activator | |
# Description: starts, stops, restarts or shows status of an Axway Synchrony Activator installation | |
### END INIT INFO |
# Probably excessive, but it makes these instructions simpler | |
sudo -i | |
# Add postgresql repo and update apt listing | |
echo "deb http://apt.postgresql.org/pub/repos/apt/ squeeze-pgdg main" > /etc/apt/sources.list.d/pgdg. | |
wget --quiet -O - https://www.postgresql.org/media/keys/ACCC4CF8.asc | sudo apt-key add - | |
apt-get update | |
# For some reason this is necessary with PostgreSQL on Ubuntu 12.04 | |
update-alternatives --remove postmaster.1.gz /usr/share/postgresql/9.1/man/man1/postmaster.1.gz |
#!/bin/bash | |
env x='() { :;}; echo vulnerable' bash -c "echo this is a test" | grep vulnerable > /dev/null 2>&1 | |
if [ $? -eq 1 ]; then | |
echo "Not vulnerable. Machine is safe." | |
exit 0 | |
else | |
echo -n "Vulnerable. Version: " | |
/bin/bash --version | |
echo "Installing patch." |
I hereby claim:
To claim this, I am signing this object:
#!/usr/bin/env bash | |
# check_freak.sh | |
# (c) 2015 Martin Seener | |
# Simple script which checks SSL/TLS services for the FREAK vulnerability (CVE 2015-0204) | |
# It will output if the checked host is vulnerable and returns the right exit code | |
# so it can also be used as a nagios check! | |
PROGNAME=$(basename $0) |
* First: Install libxml2 through RVM | |
rvm pkg install libxml2 | |
* Then: Configure libxml in bundle | |
bundle config build.libxml-ruby \ | |
--with-xml2-lib=${HOME}/.rvm/usr/lib \ | |
--with-xml2-include=${HOME}/.rvm/usr/include/libxml2 |
-- The C compiler identification is AppleClang 8.0.0.8000042 | |
-- The CXX compiler identification is AppleClang 8.0.0.8000042 | |
-- Check for working C compiler: /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/clang | |
-- Check for working C compiler: /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/clang -- works | |
-- Detecting C compiler ABI info | |
-- Detecting C compiler ABI info - done | |
-- Detecting C compile features | |
-- Detecting C compile features - done | |
-- Check for working CXX compiler: /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/clang++ | |
-- Check for working CXX compiler: /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/clang++ -- works |