Minimal example: transcode from MP3 to WMA:
ffmpeg -i input.mp3 output.wma
You can get the list of supported formats with:
ffmpeg -formats
You can get the list of installed codecs with:
def dict_to_redis_hset(r, hkey, dict_to_store): | |
""" | |
Saves `dict_to_store` dict into Redis hash, where `hkey` is key of hash. | |
>>> import redis | |
>>> r = redis.StrictRedis(host='localhost') | |
>>> d = {'a':1, 'b':7, 'foo':'bar'} | |
>>> dict_to_redis_hset(r, 'test', d) | |
True | |
>>> r.hgetall('test') |
xstat() { | |
for target in "${@}"; do | |
inode=$(ls -di "${target}" | cut -d ' ' -f 1) | |
fs=$(df "${target}" | tail -1 | awk '{print $1}') | |
crtime=$(sudo debugfs -R 'stat <'"${inode}"'>' "${fs}" 2>/dev/null | | |
grep -oP 'crtime.*--\s*\K.*') | |
printf "%s\t%s\n" "${crtime}" "${target}" | |
done | |
} |
#!/bin/bash | |
fn="$1" | |
of=`echo $1 | sed s/mp4/jpg/` | |
lf=`ffprobe -show_streams "$fn" 2> /dev/null | grep nb_frames | head -1 | cut -d \= -f 2` | |
rm -f "$of" | |
let "lf = $lf - 1" | |
ffmpeg -i $fn -vf select=\'eq\(n,$lf\) -vframes 1 $of |
[Unit] | |
Description=consul agent | |
Requires=network-online.target | |
After=network-online.target | |
[Service] | |
EnvironmentFile=-/etc/sysconfig/consul | |
Environment=GOMAXPROCS=2 | |
Restart=on-failure | |
ExecStart=/usr/local/sbin/consul agent $OPTIONS -config-dir=/etc/consul.d |
#!/bin/bash | |
# CHANGE THESE | |
auth_email="user@example.com" | |
auth_key="c2547eb745079dac9320b638f5e225cf483cc5cfdda41" # found in cloudflare account settings | |
zone_name="example.com" | |
record_name="www.example.com" | |
# MAYBE CHANGE THESE | |
ip=$(curl -s http://ipv4.icanhazip.com) |
###Pikachu A | |
proxmark3> hf mfu info | |
--- Tag Information --------- | |
------------------------------------------------------------- | |
TYPE : NTAG 215 504bytes (NT2H1511G0DU) | |
UID : 04 a6 16 72 61 3e 80 | |
UID[0] : 04, NXP Semiconductors Germany | |
BCC0 : 3C, Ok | |
BCC1 : AD, Ok |
# Source: | |
# https://www.cloudflare.com/ips | |
# https://support.cloudflare.com/hc/en-us/articles/200169166-How-do-I-whitelist-CloudFlare-s-IP-addresses-in-iptables- | |
for i in `curl https://www.cloudflare.com/ips-v4`; do iptables -I INPUT -p tcp -m multiport --dports http,https -s $i -j ACCEPT; done | |
for i in `curl https://www.cloudflare.com/ips-v6`; do ip6tables -I INPUT -p tcp -m multiport --dports http,https -s $i -j ACCEPT; done | |
# Avoid racking up billing/attacks | |
# WARNING: If you get attacked and CloudFlare drops you, your site(s) will be unreachable. | |
iptables -A INPUT -p tcp -m multiport --dports http,https -j DROP |
package main | |
import ( | |
"net" | |
"os/exec" | |
"github.com/k0kubun/pp" | |
) | |
func Hosts(cidr string) ([]string, error) { |