1) Filter Table
Filter is default table for iptables. So, if you don’t define you own table, you’ll be using filter table. Iptables’s filter table has the following built-in chains.
#!/bin/bash | |
USER="root" | |
PASSWORD="" | |
FILES="/Users/tenold/Backups/MySQL/*" | |
for f in $FILES | |
do | |
echo "Processing $f file..." |
#!/usr/bin/bash | |
#title :mkuser.sh | |
#description :This script will make random password for root, new user, new user as sudo, clear history | |
#author :Trle94 @ Castlegem SRL | |
#date :03.04.2018 | |
#version :0.1 | |
#usage :./mkuser.sh | |
#-------------------------------------------------------------------------------- | |
[ $EUID -eq 0 ] || { echo "This script needs to be ran with SUDO!"; exit 1; } |
Summary: Coova-Chilli is a Wireless LAN Access Point Controller | |
Name: coova-chilli | |
Version: 1.3.0 | |
Release: 1 | |
URL: http://www.coova.org/ | |
Source0: %{name}-%{version}.tar.gz | |
License: GPL | |
Group: System Environment/Daemons | |
BuildRoot: %{_tmppath}/%{name}-root |
apt-get update | |
apt-get install -y g++ automake autoconf libtool libltdl-dev gengetopt make cmake libssl-dev | |
git clone https://github.com/coova/coova-chilli | |
git checkout 1.4 | |
./bootstrap |
HS_WANIF=eth0 | |
HS_LANIF=eth1 | |
HS_NETWORK=172.16.1.0 | |
HS_NETMASK=255.255.255.0 | |
HS_UAMLISTEN=172.16.1.1 | |
HS_UAMPORT=3990 | |
HS_DNS1=208.67.222.222 | |
HS_DNS2=208.67.220.220 | |
HS_UAMUIPORT=4990 | |
HS_NASID=localhost |
1) Filter Table
Filter is default table for iptables. So, if you don’t define you own table, you’ll be using filter table. Iptables’s filter table has the following built-in chains.
Two ways to do it, but only worked for me so I'll put it first and the second for reference:
$ openssl pkcs12 -export -in hostname.crt -inkey hsotname.key -out hostname.p12
$ openssl pkcs12 -in hostname.p12 -nodes -out hostname.pem
Other options for this method in comments below:
# Note, the -certfile root.crt appends all CA certs to the export, I've never needed these so it's optional for my personal steps
$ openssl pkcs12 -export -in hostname.crt -inkey hsotname.key -certfile root.crt -out hostname.p12
This is a simple way to implement hCaptcha with Livewire component.
NOTE: please read this carefully, and adjust variable names, etc to your use case
Before using this implementation, add their JS library first on your page
<script src="https://js.hcaptcha.com/1/api.js?hl=en" async defer></script>
<?php | |
function base64url_encode($data) { | |
return rtrim(strtr(base64_encode($data), '+/', '-_'), '='); | |
} | |
function base64url_decode($data) { | |
return base64_decode(str_pad(strtr($data, '-_', '+/'), strlen($data) % 4, '=', STR_PAD_RIGHT)); | |
} | |
?> |
apt-get update | |
apt-get install -y g++ automake autoconf libtool libltdl-dev gengetopt make cmake libssl-dev libjson-c2 libjson-c-dev | |
git clone https://github.com/coova/coova-chilli | |
./bootstrap | |
./configure --prefix=/usr --mandir=/usr/share/man --infodir=/usr/share/info \ | |
--sysconfdir=/etc --localstatedir=/var --enable-largelimits \ |