You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
An example inetd-like socket-activated service. #systemd #inetd #systemd.socket
README
This is an example of a socket-activated per-connection service (which is usually referred to as inetd-like service).
A thorough explanation can be found at http://0pointer.de/blog/projects/inetd.html.
Define a socket unit
The key point here is to specify Accept=yes, which will make the socket accept connections (behaving like inetd) and pass
only the resulting connection socket to the service handler.
In the middle file (future merged file), you can navigate between conflicts with ]c and [c.
Choose which version you want to keep with :diffget //2 or :diffget //3 (the //2 and //3 are unique identifiers for the target/master copy and the merge/branch copy file names).
:diffupdate (to remove leftover spacing issues)
:only (once you’re done reviewing all conflicts, this shows only the middle/merged file)
Place the service file (or a link to it) in /etc/systemd/system/
Place the watchdogged.py file somewhere ( and change the ExecStart portion in the .service to point at the file )
then do systemctl daemon-reload followed by systemctl start watchdogged.service
After this you can watch the progress using journalctl --follow -u watchdogged.service
change the PROBABILITY variable to something else to watch it faster/later or succeed.
Last active
November 3, 2019 09:32— forked from sepehr/pgp.md
PGP Guide
PGP Guide
GPG vs PGP
PGP can refer to two things:
The Pretty Good Privacy software originally written by Phil Zimmermann, and now owned by Symantec.
The formats for keys, encrypted messages and message signatures defined by that software. These have now been formalised as the OpenPGP standard.
The GPG software is an independent implementation of the OpenPGP standards, so you can use it to exchange encrypted messages with people using other OpenPGP implementations (e.g. Symantec's PGP).
Super Guide to the split-window tmux Subcommand (and Beyond)
Super Guide to the split-window tmux Subcommand (and Beyond)
Guide overview
tmux, like other great software, is deceptive. On the one hand, it's fairly easy
to get set up and start using right away. On the other hand, unless your needs
are simple, it's difficult to take advantage of all tmux can offer you without
spending some quality alone time with the manual. But the problem with manuals
is that they aren't geared toward beginners. They are geared toward
helping seasoned developers and computer enthusiasts quickly obtain the
How to generate & use private keys using the OpenSSL command line tool
How to Generate & Use Private Keys using OpenSSL's Command Line Tool
These commands generate and use private keys in unencrypted binary
(not Base64 “PEM”) PKCS#8 format. The PKCS#8 format is used here because
it is the most interoperable format when dealing with software that isn't
based on OpenSSL.
OpenSSL has a variety of commands that can be used to operate on private
key files, some of which are specific to RSA (e.g. openssl rsa and
openssl genrsa) or which have other limitations. Here we always use
This document shows how to deploy an OpenShift instance on a server using CodeReady Containers (crc) that can be accessed remotely from one or more client machines (sometimes called a "headless" instance). This provides a low-cost test and development platform that can be shared by developers. Deploying this way also allows a user to create an instance that uses more cpu and memory resources than may be available on his or her laptop.
While there are benefits to this type of deployment, please note that the primary use case for crc is to deploy a local OpenShift instance on a workstation or laptop and access it directly from the same machine. The headless setup is configured completely outside of crc itself, and supporting a headless setup is beyond the mission of the crc development team. Please do not ask for changes to crc to support this type of deployment, it will only cost the team time as they politely decline :)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters