I hereby claim:
- I am rafaelcalleja on github.
- I am rafaelcalleja (https://keybase.io/rafaelcalleja) on keybase.
- I have a public key ASAmJbEl3PdrEgpcAb_5KXB_Pg5MpbvByzCn8_Iq9UMPpAo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
package main | |
import ( | |
"os" | |
"os/exec" | |
) | |
func Command(args ...string) { | |
cmd := exec.Command(args[0], args[1:]...) | |
cmd.Stdin, cmd.Stdout, cmd.Stderr = os.Stdin, os.Stdout, os.Stderr |
Useful links:
As some of these sites are a bit sketchy, make sure to keep privacy & security measures. Learn more here: https://www.privacyguides.org/en/desktop-browsers/
UPDATE - I now just use https://5sim.net and choose England as the country (it works the best for me)!
#!/bin/bash | |
echo "Recreating docker iptables rules and chains" | |
echo "iptables -N DOCKER" | |
echo "iptables -N DOCKER-ISOLATION" | |
echo "iptables -t nat -N DOCKER" | |
echo "iptables -A DOCKER-ISOLATION -j RETURN" | |
echo "iptables -A FORWARD -j DOCKER-ISOLATION" | |
echo "iptables -t nat -A PREROUTING -m addrtype -dst-type LOCAL -j DOCKER" |
ChatGPT appeared like an explosion on all my social media timelines in early December 2022. While I keep up with machine learning as an industry, I wasn't focused so much on this particular corner, and all the screenshots seemed like they came out of nowhere. What was this model? How did the chat prompting work? What was the context of OpenAI doing this work and collecting my prompts for training data?
I decided to do a quick investigation. Here's all the information I've found so far. I'm aggregating and synthesizing it as I go, so it's currently changing pretty frequently.
# ------------------------------------------------ | |
# Config files are located in /etc/wireguard/wg0 | |
# ------------------------------------------------ | |
# ---------- Server Config ---------- | |
[Interface] | |
Address = 10.10.0.1/24 # IPV4 CIDR | |
Address = fd86:ea04:1111::1/64 # IPV6 CIDR | |
PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE; ip6tables -A FORWARD -i wg0 -j ACCEPT; ip6tables -t nat -A POSTROUTING -o eth0 -j MASQUERADE # Add forwarding when VPN is started | |
PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE; ip6tables -D FORWARD -i wg0 -j ACCEPT; ip6tables -t nat -D POSTROUTING -o eth0 -j MASQUERADE # Remove forwarding when VPN is shutdown |
cmd@fb:/tmp|❯ wc -l 33m-subdomain-wordlist.txt
33927885 33m-subdomain-wordlist.txt
name: Minimal Android CI Workflow | |
on: | |
push: | |
branches: | |
- master | |
tags: | |
- 'v*' | |
jobs: |
SELECT | |
tmp.ipAddress, | |
-- Calculate how many connections are being held by this IP address. | |
COUNT( * ) AS numConnections, | |
-- For each connection, the TIME column represent how many SECONDS it has been in | |
-- its current state. Running some aggregates will give us a fuzzy picture of what | |
-- the connections from this IP address is doing. | |
FLOOR( AVG( tmp.time ) ) AS timeAVG, |
# create exchange | |
curl -i -u guest:guest -H "content-type:application/json" \ | |
-XPUT -d'{"type":"fanout","durable":true}' \ | |
http://localhost:15672/api/exchanges/%2f/my.exchange.name | |
# create queue | |
curl -i -u guest:guest -H "content-type:application/json" \ | |
-XPUT -d'{"durable":true,"arguments":{"x-dead-letter-exchange":"", "x-dead-letter-routing-key": "my.queue.dead-letter"}}' \ | |
http://localhost:15672/api/queues/%2f/my.queue |