Skip to content

Instantly share code, notes, and snippets.

@vishalbelsare
vishalbelsare / chatgpt.py
Created February 6, 2025 22:34 — forked from dyllanwli/chatgpt.py
Chatgpt commodity trading based on TQSDK
from datetime import date, datetime
from contextlib import closing
import openai
import time
import math
import typing
import numpy as np
import pandas as pd
from tqsdk import tafunc, TqAuth, TqApi, TqSim, TqBacktest, TqAccount, TargetPosTask, BacktestFinished
@vishalbelsare
vishalbelsare / PostgreSQL-EXTENSIONs.md
Created April 21, 2024 17:01 — forked from joelonsql/PostgreSQL-EXTENSIONs.md
1000+ PostgreSQL EXTENSIONs

🗺🐘 1000+ PostgreSQL EXTENSIONs

This is a list of URLs to PostgreSQL EXTENSION repos, listed in alphabetical order of parent repo, with active forks listed under each parent.

⭐️ >= 10 stars
⭐️⭐️ >= 100 stars
⭐️⭐️⭐️ >= 1000 stars
Numbers of stars might not be up-to-date.

@vishalbelsare
vishalbelsare / YubiKey-GPG-SSH-guide.md
Created July 1, 2023 23:35 — forked from ageis/YubiKey-GPG-SSH-guide.md
Technical guide for using YubiKey series 4 for GPG and SSH

YubiKey 4 series GPG and SSH setup guide

Written for fairly adept technical users, preferably of Debian GNU/Linux, not for absolute beginners.

You'll probably be working with a single smartcard, so you'll want only one primary key (1. Sign & Certify) and two associated subkeys (2. Encrypt, 3. Authenticate). I've published a Bash function which automates this slightly special key generation process.

@vishalbelsare
vishalbelsare / Top_Public_Time_Servers.md
Created June 1, 2023 21:51 — forked from mutin-sa/Top_Public_Time_Servers.md
List of Top Public Time Servers

Google Public NTP [AS15169]:

time.google.com

time1.google.com

time2.google.com

time3.google.com

@vishalbelsare
vishalbelsare / arch_linux_install_guide.md
Created June 1, 2023 21:09 — forked from myyc/arch_linux_install_guide.md
Arch Linux setup with all the good stuff (Plymouth, encryption, systemd-boot etc.)

Hope this will stay relevant for longer than just 2021. This guide will focus mostly on things you shouldn't overlook and will harshly prioritise assuming that you're running on recent hardware. EFI and all that.

Always refer to the official guide in case of doubt.

First things first

One important thing first: the environment you will encounter on the live image is very different from what you'll end up installing, some things are significantly easier there: e.g. wifi tools come pre-installed, the default shell is a pimped zsh with nice completions, and so on. We'll keep this

@vishalbelsare
vishalbelsare / arch-linux-install.md
Created June 1, 2023 21:03 — forked from Thrilleratplay/ arch-linux-install.md
Installing Arch Linux on a fully encrypted LUKS partition using GRUB
#!/usr/bin/env bash
#
# Author: Markus (MawKKe) [email protected]
# Date: 2018-03-19
#
#
# What?
#
# Linux dm-crypt + dm-integrity + dm-raid (RAID1)
#
@vishalbelsare
vishalbelsare / sd-integrity
Created June 1, 2023 00:24
mkinitcpio build hook for dm-integrity devices
#!/bin/bash
build() {
local mod
add_module 'dm-integrity'
add_module 'dm-bufio'
add_module 'dm-mod'
add_module 'async_xor'
#!/usr/bin/env bash
#
# Author: Markus (MawKKe) [email protected]
# Date: 2018-03-19
#
#
# What?
#
# Linux dm-crypt + dm-integrity + dm-raid (RAID1)
#
@vishalbelsare
vishalbelsare / full-disk-encryption-arch-uefi.md
Created May 10, 2023 15:35 — forked from huntrar/full-disk-encryption-arch-uefi.md
Arch Linux Full-Disk Encryption Installation Guide [Encrypted Boot, UEFI, NVMe, Evil Maid]

Arch Linux Full-Disk Encryption Installation Guide

This guide provides instructions for an Arch Linux installation featuring full-disk encryption via LVM on LUKS and an encrypted boot partition (GRUB) for UEFI systems.

Following the main installation are further instructions to harden against Evil Maid attacks via UEFI Secure Boot custom key enrollment and self-signed kernel and bootloader.

Preface

You will find most of this information pulled from the Arch Wiki and other resources linked thereof.

Note: The system was installed on an NVMe SSD, substitute /dev/nvme0nX with /dev/sdX or your device as needed.