View CiscoKeyGen.py
#! /usr/bin/python
print "\n*********************************************************************"
print "Cisco IOU License Generator - Kal 2011, python port of 2006 C version"
import os
import socket
import hashlib
import struct
# get the host id and host name to calculate the hostkey
hostid=os.popen("hostid").read().strip()
hostname = socket.gethostname()
View vivaldi.key
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1
mQINBFTBKn4BEAC7ErevA1MlE2Sux6TZ/4DjnD9qcpAFxHVAElw6yFdP123ORnaV
La+MV2yx7Kn6GSPjF9ET/+f2BPmE76QBK8LMfobbLRJuBtjs8v0ObhcaVqXuM0hk
GpqnYvyGO0OaZRT42/ca9+5LororcUesuyzmMwgDjlrr5bmpK4CsJausDPm7l5UC
5geTLXj9SfbXh9KUolCbRfliTyEBn7wXUARHQL9VYPSaV+stwF7f49shm+p+qN4R
aQTmjrx0z7rJ7SvYuhnVmJ3esq2eLlFDA73GaUieKjJk6hbmC+0ZFXqcMjpPTawr
KPP8Yyl8uVGALD1UTj+tIw0SSOvJeGWqYWnpkKL32igl2GWuEbbA0QdSefx5ECJ1
OM91A9eUtCM5Ox8VZGz8cZt6xWXU18Xeu+2KdFvpm0UJAc49Wez+66WXSduSplMB
View dirtyfix-readynas-os6-treestructure.sh
#!/bin/bash
cd / ;
chmod 777 apps ; chown root:root apps ;
chmod 755 bin ; chown root:root bin ;
chmod 755 boot ; chown root:root boot ;
chmod 755 data ; chown root:root data ;
chmod 755 dev ; chown root:root dev ;
chmod 755 etc ; chown root:root etc ;
chmod 755 frontview ; chown root:root frontview ;
View bdfix.sh
#!/bin/bash
cat /opt/BitDefender-scanner/var/lib/scan/versions.dat.* | \
awk '/bdcore.so.linux/ {print $3}' | \
while read bdcore_so; do
touch /opt/BitDefender-scanner/var/lib/scan/$bdcore_so;
bdscan --update;
mv /opt/BitDefender-scanner/var/lib/scan/bdcore.so \
/opt/BitDefender-scanner/var/lib/scan/bdcore.so.old;
rm /opt/BitDefender-scanner/var/lib/scan/bdcore.so;
ln -s /opt/BitDefender-scanner/var/lib/scan/$bdcore_so \
View discover_session_bus_address.sh
#!/bin/bash
# Remember to run this script using the command "source ./filename.sh"
# Search these processes for the session variable
# (they are run as the current user and have the DBUS session variable set)
compatiblePrograms=( nautilus kdeinit kded4 pulseaudio trackerd )
# Attempt to get a program pid
for index in ${compatiblePrograms[@]}; do
View apt
# Debian apt(8) completion -*- shell-script -*-
_apt()
{
local cur prev words cword
_init_completion || return
local special i
for (( i=0; i < ${#words[@]}-1; i++ )); do
if [[ ${words[i]} == @(list|search|show|update|install|remove|upgrade|full-upgrade|edit-sources|dist-upgrade|purge) ]]; then
View 50-plantronics.conf
# Plantronics headsets presents itself as an usb sound card, a mouse and a keyboard.
# This gives lockups of the mouse or constant mouse click actions.
#
# To make X11 ignore the keyboard and mouse features, download this xorg.conf file to
# /usr/share/X11/xorg.conf.d/50-plantronics.conf
#
#
Section "InputClass"
Identifier "Plantronics"
MatchVendor "Plantronics"
View amd_remove_unsupported_watermark.sh
#!/bin/sh
DRIVER=`find /usr/lib -name fglrx_drv.so`
echo "Come on AMD!"
for token in $DRIVER;do
echo "Removing AMD logo from "$token
for x in $(objdump -d $DRIVER|awk '/call/&&/EnableLogo/{print "\\x"$2"\\x"$3"\\x"$4"\\x"$5"\\x"$6}'); do
sed -i "s/$x/\x90\x90\x90\x90\x90/g" $DRIVER