#!/usr/bin/perl -n | |
# | |
# Achtung: Das Skript ist ein fieser Hack, welcher vermutlich nicht in allen | |
# Faellen funktioniert. Fuer mich hat es fuer erste Experimente | |
# ausreichend gut funktioniert. | |
# | |
# Einzelne Ausgabe von "pdf2txt" einer einer einzelnen PDF Datei | |
# als Parameter oder via Pipe uebergeben. | |
# |
See how a minor change to your commit message style can make a difference.
Tip
Take a look at git-conventional-commits , a CLI util to ensure these conventions, determine version and generate changelogs
The instructions were tested on a Lenovo X1 Carbon 5th Gen (X1C5) on Arch Linux but should be applicable to other Lenovo models and Linux distributions.
BACKUP YOUR DATA! I created a bootable Ubuntu Image like this:
$ sudo sh -c 'curl --location --silent --fail "http://releases.ubuntu.com/18.04/ubuntu-18.04.1-desktop-amd64.iso" | pv > /dev/<your-usb-drive>'
# note that pv is only there to show progress, it is perfectly fine to redirect curl to the usb drive directly.
then I booted from this drive by pressing F12 on reboot and dumped my NVMe disk to an external hard drive like this:
#### Contents of the preconfiguration file (for stretch) | |
### Localization | |
# Preseeding only locale sets language, country and locale. | |
d-i debian-installer/locale string en_US.UTF-8 | |
# The values can also be preseeded individually for greater flexibility. | |
#d-i debian-installer/language string en | |
#d-i debian-installer/country string US | |
#d-i debian-installer/locale string en_US.UTF-8 |
https://gnu-linux.org/building-ubuntu-rootfs-for-arm.html | |
"2) Extract the downloaded image with ‘sudo’ to allow ‘mknod’ commands to work" | |
# get a cloud image from here | |
# https://cloud-images.ubuntu.com/daily/server/xenial/ | |
# https://cloud-images.ubuntu.com/daily/server/xenial/current/ | |
# based on https://bazaar.launchpad.net/~maas-images-maintainers/maas-images/maas-ephemerals/view/head:/bin/img2squashfs#L161 | |
# extract a cloud image rootfs to a directory, sudo is needed for `mknod`s to work | |
# doesn't have to be .tar.gz - could well unsquashfs an existing squashfs |
This is a guide that I wrote to improve the default security of my website https://fortran.io , which has a certificate from LetsEncrypt. I'm choosing to improve HTTPS security and transparency without consideration for legacy browser support.
WARNING: if you mess up settings, lose your certificates, or decide to no longer maintain HTTPS certs, these steps can and will make your domain inaccessible.
I would recommend these steps only if you have a specific need for information security, privacy, and trust with your users, and/or maintain a separate secure.example.com domain which won't mess up your main site. If you've been thinking about hosting a site on Tor, then this might be a good option, too.
The best resources that I've found for explaining these steps are https://https.cio.gov , https://certificate-transparency.org , and https://twitter.com/konklone
A curated list of AWS resources to prepare for the AWS Certifications
A curated list of awesome AWS resources you need to prepare for the all 5 AWS Certifications. This gist will include: open source repos, blogs & blogposts, ebooks, PDF, whitepapers, video courses, free lecture, slides, sample test and many other resources.
#!/bin/bash | |
vault mount -path=rootpki pki | |
vault mount-tune -max-lease-ttl="175200h" rootpki | |
vault write rootpki/root/generate/exported common_name=example.com ttl="175200h" | |
vault write rootpki/root/generate/internal common_name=example.com ttl="175200h" | |
vault write rootpki/intermediate/generate/exported common_name=example.com ttl="175200h" | |
vault write rootpki/intermediate/generate/internal common_name=example.com ttl="175200h" | |
vault mount -path=intermediatepki pki | |
vault mount-tune -max-lease-ttl="8760h" intermediatepki |
Those are my personal notes on AWS Solution Architect certification preparation. Hope you find them usefull.
To pass AWS certification, you should have:
- Sound knowledge about most of the AWS services ( EC2, VPC, RDS, Cloudfront, S3, Route53 etc,)
- Hands on experience with AWS services.