Discover gists
apt install flex bison | |
git clone https://github.com/microsoft/WSL2-Linux-Kernel --depth 1 | |
cd WSL2-Linux-Kernel/tools/perf | |
make -j8 | |
sudo cp perf /usr/local/bin |
# disable | |
powershell -command 'Set-MpPreference -DisableRealtimeMonitoring $true -DisableScriptScanning $true -DisableBehaviorMonitoring $true -DisableIOAVProtection $true -DisableIntrusionPreventionSystem $true' | |
# Or exclude | |
powershell -command 'Add-MpPreference -ExclusionPath "c:\temp" -ExclusionProcess "c:\temp\yourstuffs.exe"' |
#!/bin/sh | |
# Copyright 2023 Khalifah K. Shabazz | |
# | |
# Permission is hereby granted, free of charge, to any person obtaining a | |
# copy of this software and associated documentation files (the “Software”), | |
# to deal in the Software without restriction, including without limitation | |
# the rights to use, copy, modify, merge, publish, distribute, sublicense, | |
# and/or sell copies of the Software, and to permit persons to whom the | |
# Software is furnished to do so, subject to the following conditions: |
:0: the only difference between digitalriver and technet is the _naming_, nothing else! | |
:1: please VERIFY md5/sha1-sums after each download (msdn-links containing proof of sha1-sums are linked behind each iso) | |
:2: the isos are provided as is | |
:3: if you\'re a microsoft representative, please dont be pissed, i just help your customers where you leave \'em in the dark (i do not provide keys here!), thank you! | |
## DIGITALRIVER ## ## TECHNET ## ## MD5 ## ## SHA-1 ## ## MSDN ## | |
------------- de_windows_7_starter_with_sp1_x86_dvd_u_678545.iso 7e88e30b655dc9bb8ce0a2e2a4f803f3 37bb946b83ef5ed801a634bd644abf03bf15952a 46892 | |
------------- de_windows_7_starter_n_with_sp1_x86_dvd_u_678311.iso ae512ac4abd6e5bfc9323011e19efc43 d91321298c5483ea74e2264020c36adcffccaae6 46923 | |
------------- de_windows_7_home_basic_with_sp1_x86_dvd_u_676467.iso 9cf2cf1d30404b9fa71acf4db7e28d67 5b86b6690b2ef236e71b256794a625c44d846952 47165 |
- name: Check is rvm installed | |
shell: command -v rvm >/dev/null 2>&1 | |
register: is_rvm_exist | |
ignore_errors: yes | |
- debug: msg="{{ is_rvm_exist.rc }}" # it returns rc 1 | |
- debug: var=is_rvm_exist | |
- name: Check is ls installed | |
shell: command -v ls >/dev/null 2>&1 |
Our goal today is to configure a VLAN for "Internet of Things" devices that is sequestered from our default private network. Devices on the private network are free to initiate connections into our IoT VLAN, but devices in the IoT VLAN should not be able to initiate connections to one another or to the private network.
The focus of this document is the configuration of UniFi system to allow Sonos speakers to operate across VLANs. Creating the VLAN itself is left to the user (there are many other guides out there that cover this topic). For our discussion, here are the networks we'll be working with:
10.1.1.0/24
- this is our Private network where our trusted devices live.10.1.20.0/24
- this is our IoT network configured as VLAN 20; Sonos devices live here.
Each Sonos speaker is assigned a static IP address via a DHCP reservation. These static IP addresses enable us to write some targeted firewall to allow the Sonos software to work across our V
function saveTextToFile() { | |
const saveText = "tmp"; | |
// file setting | |
const text = saveText; | |
const name = "sample.json"; | |
const type = "text/plain"; | |
// create file | |
const a = document.createElement("a"); |
Knowledge and Education should be open and free. Hierarchy and Exploitation must be abolished.
Wayback Machine (archive of the internet), Anna's Archive (open ebooks/papers library), 1337x (archive of all media).
- Z. (down) Notes below. Avoid all funnel sales and paid bootcamps at all cost, and don't ever work free for someone (take home projects, one way interview, etc.), you're just feeding the scammers and grifters while wasting your time and resources. Also don't forget proper OpSec (don't talk about your personal details, identifiable pictures/location/voice/metadata; aware of social engineering, sunk cost fallacy, FUD, FOMO, and identity theft; and do threat modeling, etc.), self defense gears, and physical/mental strength.
- A. (go) Development Environment (10 items) (Linux, Neovim, Dev Tools, Languages, Configs, S