start new:
tmux
start new with session name:
tmux new -s myname
# status bar | |
# set-option -g status-utf8 on | |
set -g status-interval 1 | |
set -g status-justify centre # center align window list | |
set -g status-left-length 20 | |
set -g status-right-length 140 | |
set -g status-left '#[fg=green]#H #[fg=black]• #[fg=green,bright]#(uname -r | cut -c 1-6)#[default]' | |
set -g status-right '#[fg=green]#(tmux-mem-cpu-load 1) #[]#(uptime | cut -f 4-5 -d " " | cut -f 1 -d ",") %a%l:%M:%S %p %Y-%m-%d' |
mkdir -p /usr/local/etc/nginx/sites-{enabled,available}
cd /usr/local/etc/nginx/sites-enabled
ln -s ../sites-available/default.conf
ln -s ../sites-available/default-ssl.conf
File locations:
nginx.conf
to /usr/local/etc/nginx/
default.conf
and default-ssl.conf
to /usr/local/etc/nginx/sites-available
homebrew.mxcl.nginx.plist
to /Library/LaunchDaemons/
##TCP FLAGS## | |
Unskilled Attackers Pester Real Security Folks | |
============================================== | |
TCPDUMP FLAGS | |
Unskilled = URG = (Not Displayed in Flag Field, Displayed elsewhere) | |
Attackers = ACK = (Not Displayed in Flag Field, Displayed elsewhere) | |
Pester = PSH = [P] (Push Data) | |
Real = RST = [R] (Reset Connection) | |
Security = SYN = [S] (Start Connection) |
# Set variables in .bashrc file | |
# don't forget to change your path correctly! | |
export GOPATH=$HOME/golang | |
export GOROOT=/usr/local/opt/go/libexec | |
export PATH=$PATH:$GOPATH/bin | |
export PATH=$PATH:$GOROOT/bin |
Open Keychain Access.app and create new object using the host as a name (“example.com”), username with sudo rights (“user”) and it’s password.
Add a trigger for iTerm’s profile (‘Advanced‘ tab):
Regular Expression: \$ sudo
Action: Run Coprocess…
Parameters: /path/to/iterm_reply_with_keychain.rb user@example.com
#!/bin/bash | |
# Clears finished downloads from Transmission. | |
# Version: 1.1 | |
# | |
# Newest version can always be found at: | |
# https://gist.github.com/pawelszydlo/e2e1fc424f2c9d306f3a | |
# | |
# Server string is resolved in this order: | |
# 1. TRANSMISSION_SERVER environment variable |
Ansible playbook to setup HTTPS using Let's encrypt on nginx. | |
The Ansible playbook installs everything needed to serve static files from a nginx server over HTTPS. | |
The server pass A rating on [SSL Labs](https://www.ssllabs.com/). | |
To use: | |
1. Install [Ansible](https://www.ansible.com/) | |
2. Setup an Ubuntu 16.04 server accessible over ssh | |
3. Create `/etc/ansible/hosts` according to template below and change example.com to your domain | |
4. Copy the rest of the files to an empty directory (`playbook.yml` in the root of that folder and the rest in the `templates` subfolder) |
Moved to https://github.com/bmaddy/csd-vpn/blob/master/csd-responder-exec.sh |
#----------------------------------------------------------------------- | |
# same-quad-list.txt: a list of same-quad IPs by owner w/DNS status | |
# | |
# The CIDR network is the largest contiguous/bit-boundary-aligned block | |
# that is allocated to that entity (actual allocated range may be larger) | |
# NOTE: some ranges not yet converted to CIDR. | |
# Updates welcome - leave comment and/or ping royce@techsolvency.com | |
#----------------------------------------------------------------------- | |
# For human efficiency, some records are repeated here as comments. | |
# |