Shortcut | Description |
---|---|
ranger |
Start Ranger |
Q |
Quit Ranger |
R |
Reload current directory |
? |
Ranger Manpages / Shortcuts |
Discover gists
Registered Name: https://zhile.io | |
License Key: 48891cf209c6d32bf4 |
VMware Workstation Pro 16.x Serials | |
YA7RA-F6Y46-H889Z-LZMXZ-WF8UA | |
ZV7HR-4YX17-M80EP-JDMQG-PF0RF | |
UC3XK-8DD1J-089NP-MYPXT-QGU80 | |
GV100-84W16-M85JP-WXZ7E-ZP2R6 | |
YF5X2-8MW91-4888Y-DNWGC-W68TF | |
AY1XK-0NG5P-0855Y-K6ZXG-YK0T4 | |
VMware Workstation Player 16.x Serials |
import SwiftUI | |
extension Calendar { | |
func generateDates( | |
inside interval: DateInterval, | |
matching components: DateComponents | |
) -> [Date] { | |
var dates: [Date] = [] | |
dates.append(interval.start) |
According to Apple, the only way to remove an unknown firmware password from a MacBook (2011 and later) is to take it to the Apple Store with the original proof-of-purchase. However, I've found that there is another way, which I've been successful with for the unibody MacBook Pro--it's essentially just modifying a couple bytes in the EFI ROM, which should be simple. What's not simple, however, is figuring out how to read and write to the EFI chip. In this post, I'll talk about the process that I figured out and what worked for me.
Apple's method of resetting the firmware password is not reproducible, as Apple generates an SCBO file that unlocks the EFI using their private key. You can read more about this process here. The problem with this system is that, if you are in the unfortunate situation of neither having the firmware unlock pass
Inspired by:
@virgo:~ $ sudo tcpdump -vvvv -ttt -i eth1 icmp6 and 'ip6[40] = 134' | |
00:00:00.000000 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 200) fe80::b675:eff:fefa:1cb > ip6-allnodes: [icmp6 sum ok] ICMP6, router advertisement, length 200 | |
hop limit 0, Flags [managed, other stateful], pref medium, router lifetime 1800s, reachable time 0s, retrans time 0s | |
source link-address option (1), length 8 (1): b4:75:0e:fa:01:cb | |
0x0000: b475 0efa 01cb | |
mtu option (5), length 8 (1): 1280 | |
0x0000: 0000 0000 0500 | |
prefix info option (3), length 32 (4): 2a01:ffff:43f::/64, Flags [onlink, auto], valid time 7200s, pref. time 1800s | |
0x0000: 40c0 0000 1c20 0000 0708 0000 0000 2a01 | |
0x0010: ffff 043f 0000 0000 0000 0000 0000 |
""" | |
Manipulate color schemes for mintty | |
For simplicity, support only "value = r, g, b" format with decimal values | |
Copyright 2017 Vitaly Potyarkin | |
Licensed under the Apache License, Version 2.0 | |
http://www.apache.org/licenses/LICENSE-2.0 |
<?xml version="1.0" encoding="utf-8"?> | |
<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" exclude-result-prefixes="msxsl"> | |
<xsl:key name="ISSUETYPES" match="/Report/Issues/Project/Issue" use="@TypeId"/> | |
<xsl:output method="html" indent="yes"/> | |
<xsl:template match="/" name="TopLevelReport"> | |
<html> | |
<head> | |
<title>Resharper InspectCode Report</title> | |