Skip to content

Instantly share code, notes, and snippets.

destroy all computers

Tyler Langlois tylerjl

destroy all computers
Block or report user

Report or block tylerjl

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
apeckham / format.json
Last active Aug 5, 2019
fastly json log format
View format.json
ldez /
Last active Sep 18, 2019
Gmail and GitHub - Filters

Gmail and GitHub

Create new filters and create new labels.

Pull Request

from:( AND {"Patch Links" "approved this pull request." "requested changes on this pull request." "commented on this pull request." "pushed 1 commit." "pushed 2 commits." "pushed 3 commits."}

label: gh-pull-request


FWIW: I didn't produce the content presented here (the outline from Edmond Lau's book). I've just copy-pasted it from somewhere over the Internet, but I cannot remember what exactly the original source is. I was also not able to find the author's name, so I cannot give him/her the proper credits.

Effective Engineer - Notes

What's an Effective Engineer?

bmhatfield / .profile
Last active Aug 27, 2019
Automatic Git commit signing with GPG on OSX
View .profile
# In order for gpg to find gpg-agent, gpg-agent must be running, and there must be an env
# variable pointing GPG to the gpg-agent socket. This little script, which must be sourced
# in your shell's init script (ie, .bash_profile, .zshrc, whatever), will either start
# gpg-agent or set up the GPG_AGENT_INFO variable if it's already running.
# Add the following to your shell init to set up gpg-agent automatically for every shell
if [ -f ~/.gnupg/.gpg-agent-info ] && [ -n "$(pgrep gpg-agent)" ]; then
source ~/.gnupg/.gpg-agent-info
View free security

Simple Security Guidelines

Using an iDevice? (Best option)

  • Use an iPod or an iPad without a SIM card
  • Use an iPhone
  • Do not jailbreak
  • Always upgrade to new iOS versions
  • Use Brave browser

Need Secure chat?

View jekyll-readtime.rb
# jekyll-readtime
# 2015 Ron Scott-Adams, Licensed under MIT:
# Original work:
# Outputs the estimated time the average person might take to read the content.
# 200 is a round figure based on estimates gathered from various studies.
# Usage: {{ page.content | readtime }}
aphyr / zfs-sync
Created Feb 7, 2015
Sync ZFS filesystems, incrementally if possible.
View zfs-sync
#!/usr/bin/env ruby
# Synchronizes ZFS filesystems.
# Takes three args: source pool, destination pool, and filesystem name.
# Syncs most recent snapshot of filesystem from source to destination pool,
# using incremental transfer if possible.
# Take a snapshot line from zfs list -t snapshot and emit a struct
skippy / cloud-config.yml
Created Dec 31, 2014
modifying fleet metadata (from aws meta-data service) before fleet.service start; this is a proof of concept (but it works!)
View cloud-config.yml
- name: update-fleet-metadata.service
command: start
content: |-
Description=Update Fleet metadata tag
sivel /
Last active Aug 31, 2019
Better SSH Authorized Keys Management

Better SSH Authorized Keys Management

A seemingly common problem that people encounter is how to handle all of your users authorized_keys file.

People struggle over management, ensuring that users only have specific keys in the authorized_keys file or even a method for expiring keys. A centralized key management system could help provide all of this functionality with a little scripting.

One piece of functionality overlooked in OpenSSH is the AuthorizedKeysCommand configuration keyword. This configuration allows you to specify a command that will run during login to retrieve a users public key file from a remote source and perform validation just as if the authorized_keys file was local.

Here is an example directory structure for a set of users with SSH public keys that can be shared out via a web server:

You can’t perform that action at this time.