I hereby claim:
- I am scusi on github.
- I am scusi (https://keybase.io/scusi) on keybase.
- I have a public key whose fingerprint is 76E8 BAB1 353D 8C0F F02E 5458 CE76 1F98 7245 6F13
To claim this, I am signing this object:
# Source: https://techcommunity.microsoft.com/t5/exchange/upload-s-mime-user-certificate-with-outlook-to-the-gal/m-p/3781147 | |
# | |
# i do not know if this code works, never tried. | |
# i just wanted to keep it, just in case or to try it one day. | |
# Even if it does not work, it might be a good starting point. | |
# ~scusi | |
############################################################################### | |
#Set UserCertificate in EXO | |
############################################################################### | |
Connect-ExchangeOnline |
I hereby claim:
To claim this, I am signing this object:
# vim: filetype=neomuttrc | |
# Default index colors: | |
color index yellow default '.*' | |
color index_author red default '.*' | |
color index_number blue default | |
color index_subject cyan default '.*' | |
# For new mail: | |
color index brightyellow black "~N" | |
color index_author brightred black "~N" |
#!/bin/bash | |
# | |
# Converts LDIF data to CSV. | |
# Doesn't handle comments very well. Use -LLL with ldapsearch to remove them. | |
# | |
# 2010-03-07 | |
# dsimmons@squiz.co.uk | |
# | |
# Show usage if we don't have the right params |
## | |
## IMAP CREDENTIALS | |
## | |
set smtp_url = "smtp://some_user@smtp.gmail.com:587/" | |
#set smtp_pass = "password" | |
set from = "someuser@example.com" | |
set realname = "Some User" | |
## | |
## IMAP SETTINGS |
#!/bin/bash | |
# | |
# this shell script will install nbd-client package on desinfect | |
# | |
cd ~/Downloads | |
echo "[*] download nbd-client package for AMD64 architecture" | |
wget -O -J http://de.archive.ubuntu.com/ubuntu/pool/universe/n/nbd/nbd-client_3.20-1_amd64.deb | |
echo "[*] install nbd-client package" | |
sudo dpkg -i nbd-client_3.20-1_amd64.deb | |
echo "[*] delete downloaded package file" |
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 | |
$wc = New-Object System.Net.WebClient | |
if (!(Test-Path "C:\Tools")) { | |
New-Item -Path "C:\" -Name "Tools" -ItemType "directory" | |
} | |
# SYSMON | |
# Download Sysmon | |
$SysmonDirectory = "C:\Tools\Sysmon\" |
# powershell script to (re-)enable telemetry in win10 | |
# | |
# flw@posteo.de | |
# | |
# run as admin | |
if (!([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { Start-Process powershell.exe "-NoProfile -ExecutionPolicy Bypass -File `"$PSCommandPath`"" -Verb RunAs; exit } | |
# Step 1: deactivate DiagTrack service | |
Set-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Services\DiagTrack\ -name Start -Value 2 |
# powershell script to disable telemetry in win10 | |
# | |
# Source: | |
# https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Cyber-Sicherheit/SiSyPHus/Analyse_Telemetriekomponente.pdf?__blob=publicationFile&v=3 | |
# run as admin | |
if (!([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { Start-Process powershell.exe "-NoProfile -ExecutionPolicy Bypass -File `"$PSCommandPath`"" -Verb RunAs; exit } | |
# Step 1: deactivate DiagTrack service | |
Set-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Services\DiagTrack\ -name Start -Value 4 |
package main | |
import ( | |
"container/ring" | |
"flag" | |
"io/ioutil" | |
"log" | |
) | |
var keyFile string |