This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!ipxe | |
# Some menu defaults | |
set menu-timeout 60000 | |
set submenu-timeout ${menu-timeout} | |
isset ${menu-default} || set menu-default exit | |
###################### MAIN MENU #################################### |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
cd C:\Windows\Temp | |
& curl.exe --output glazier.iso https://storage.googleapis.com/example-glazier-files/OSDCloud-WinPE-Glazier.iso | |
Mount-DiskImage C:\Windows\Temp\glazier.iso -PassThru | |
$driveLetter = ($mountResult | Get-Volume).DriveLetter | |
Copy-Item -Path $( -join($driveLetter, ":\sources\") ) -Destination C:\sources -Recurse | |
mkdir C:\boot | |
Copy-Item -Path $( -join($driveLetter, ":\boot\boot.sdi" ) ) -Destination C:\boot\boot.sdi | |
Dismount-DiskImage C:\Windows\Temp\glazier.iso |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
logging: | |
receivers: | |
dhcp_audit: | |
type: files | |
include_paths: | |
- C:\Windows\System32\dhcp\DhcpSrvLog-*.log | |
record_log_file_path: true | |
processors: | |
exclude_dhcp_guff: | |
type: exclude_logs |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Write-Host "Checking for Administrator permission..." | |
if (-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { | |
Write-Warning "Insufficient permissions to run this script. Open the PowerShell console as administrator and run this script again." | |
Break | |
} else { | |
Write-Host "Running as administrator: continuing execution..." -ForegroundColor Green | |
} | |
$patchfile = $args[0] | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://fw-download.ubnt.com/data/uvc/c50c-s2l-4.41.16-bcf8b0e1872741b780e45c3d4114f711.bin |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"require": { | |
"google/cloud": "^0.171.0" | |
} | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ProgressPreference = 'SilentlyContinue' | |
$TeamsSettings = $HOME + "\AppData\Roaming\Microsoft\Teams\settings.json" | |
$Setting = Get-Content $TeamsSettings -ErrorAction Continue | ConvertFrom-Json | Select Version | |
$Version = $Setting.Version | |
echo "Checking for updates..." | |
$UpdateInfo = curl "https://teams.microsoft.com/desktopclient/update/$Version/windows/x64?ring=general" | |
$UpdateData = $UpdateInfo | ConvertFrom-json |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
runtime: go111 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
-- Looking towards the "Legacy TLS" turndown in June 2018, | |
-- we needed to analyse which devices / browsers are still accessing, by parsing the User Agent. | |
-- This is in BigQuery Legacy SQL, with field names based on Cloudflare's Enterprise Log Share data. | |
CASE | |
WHEN ClientRequestUserAgent LIKE '%Windows Phone%' THEN CONCAT('Windows Phone/', IF(REGEXP_MATCH(ClientRequestUserAgent, r'Windows Phone ([0-9\.]+);'), REGEXP_EXTRACT(ClientRequestUserAgent, r'Windows Phone ([0-9\.]+);'), 'UNKNOWN')) | |
WHEN ClientRequestUserAgent LIKE '%MSIE%' THEN CONCAT('MSIE/', IF(REGEXP_MATCH(ClientRequestUserAgent, r'MSIE ([0-9\.]+)'), REGEXP_EXTRACT(ClientRequestUserAgent, r'MSIE ([0-9\.]+)'), 'UNKNOWN')) | |
WHEN ClientRequestUserAgent LIKE '%Trident%' THEN CONCAT('MSIE/Trident/', IF(REGEXP_MATCH(ClientRequestUserAgent, r'Trident/([0-9\.]+)'), REGEXP_EXTRACT(ClientRequestUserAgent, r'Trident/([0-9\.]+)'), 'UNKNOWN')) | |
WHEN ClientRequestUserAgent LIKE '%Firefox%' THEN CONCAT('Firefox/', IF(REGEXP_MATCH(ClientRequestUserAgent, r'Fi |
NewerOlder