This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# pactl list short sinks | |
#61 alsa_output.usb-SteelSeries_SteelSeries_Arctis_1_Wireless-00.analog-stereo PipeWire s16le 2ch 48000Hz RUNNING | |
#63 alsa_output.pci-0000_00_1f.3.analog-stereo PipeWire s32le 2ch 48000Hz SUSPENDED | |
# Set your actual sink names here | |
SPEAKERS="alsa_output.pci-0000_00_1f.3.analog-stereo" | |
HEADSET="alsa_output.usb-SteelSeries_SteelSeries_Arctis_1_Wireless-00.analog-stereo" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# I use this script on a few NGINX servers that are behind Cloudflare. I use it to restrict access and to only allow access from a Cloudflare IP addresses. | |
# This means that clients must hit cloudflare's proxied DNS first before accessing your website, reventing clients from accessing your server via the host/server IP. | |
# The script downloads a list of Cloudflare IP addresses, generates a allow list file, restarts NGINX, creates firewall rules using UFW, restarts UFW. | |
# I run the script as a cron job on a weekly schedule. | |
# Add this line to your websites nginx config. | |
# include /etc/nginx/cloudflare_ips.conf; | |