I hereby claim:
- I am neontuna on github.
- I am nightiron (https://keybase.io/nightiron) on keybase.
- I have a public key whose fingerprint is D52F 6F3C 42EC 041C F606 65BC 9D60 6895 BBD9 73DA
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
; Turn master volume up and down with Ctrl-Alt-Up/Down | |
; Toggle mute with Ctrl-Alt-S | |
^!Up::Send {Volume_Up} | |
^!Down::Send {Volume_Down} | |
^!s::Send {Volume_Mute} | |
; Toggle Mic mute with Ctrl-Alt-A | |
; Uses the name of the device as it appears in device manager (Blue Snowball in this case) | |
; Plays default Windows mute and unmute sounds |
By default Microsoft active directory servers will offer LDAP connections over unencrypted connections (boo!).
The steps below will create a new self signed certificate appropriate for use with and thus enabling LDAPS for an AD server. Of course the "self-signed" portion of this guide can be swapped out with a real vendor purchased certificate if required.
Steps have been tested successfully with Windows Server 2012R2, but should work with Windows Server 2008 without modification. Will require both a system with OpenSSL (ideally Linux/OSX) and (obviously) a Windows Active Directory server.
Enable SSH on the Retropie, will be easier to go back if needed
Edit /opt/retropie/configs/all/autostart.sh
Replace emulationstation #auto
with the following
ls ~/RetroPie/roms/gb |sort -R |tail -1 |while read file; do
trimfile=$(echo $file | rev | cut -c 4- | rev)
/opt/retropie/supplementary/runcommand/runcommand.sh 0 _SYS_ gb ~/RetroPie/roms/gb/"$trimfile".7z
[{ | |
"id": "55f3bc6a.8e7b5c", | |
"type": "tab", | |
"label": "Front Door Motion", | |
"disabled": false, | |
"info": "" | |
}, { | |
"id": "b8dc9ef2.f1ea", | |
"type": "server-state-changed", | |
"z": "55f3bc6a.8e7b5c", |