Пример выгрузки файлов на Яндекс.Диск из Bash через официальный REST API.
Тут все просто.
Пример выгрузки файлов на Яндекс.Диск из Bash через официальный REST API.
Тут все просто.
| sudo rm -rf "/Library/Application Support/Paragon Software/" | |
| sudo rm /Library/LaunchDaemons/com.paragon-software.installer.plist | |
| sudo rm /Library/LaunchDaemons/com.paragon-software.ntfs.loader.plist | |
| sudo rm /Library/LaunchDaemons/com.paragon-software.ntfsd.plist | |
| sudo rm /Library/LaunchAgents/com.paragon-software.ntfs.notification-agent.plist | |
| sudo rm -rf /Library/Filesystems/ufsd_NTFS.fs/ | |
| sudo rm -rf /Library/PrivilegedHelperTools/com.paragon-software.installer | |
| sudo rm -rf /Library/Extensions/ufsd_NTFS.kext/ | |
| sudo rm -rf /Library/PreferencePanes/ParagonNTFS.prefPane |
| # 0. Have a binary to codesign. | |
| # NOTE: I use `if os.Getenv("SKIP_FTP") != "" { t.Skip("...") }` to allow skipping the test when running the full test suite. | |
| go test -c -o ./path/to/package/test_binary ./path/to/package | |
| # 1. Create self-signed private key and certificate | |
| # IMPORTANT: The `-addext` flags are essential for codesigning purposes. | |
| openssl req -new -x509 -days 365 -nodes \ | |
| -keyout ExampleTestBinaryCodeSigning.key -out ExampleTestBinaryCodeSigning.crt \ |
| # Update Hurricane Electric IPv6 Tunnel Client IPv4 address | |
| # This is an upgrade to an existing script from | |
| # http://wiki.mikrotik.com/wiki/Hurricane_Electric_IPv6_Tunnel_-_IPv4_Endpoint_updater | |
| # API call format: | |
| # https://#USERNAME:[email protected]/nic/update?username=$USERNAME&password=$API_KEY&hostname=$TUNNEL_ID | |
| # ---------------------------------- | |
| # Modify the following to match your parameters | |
| # ---------------------------------- | |
| # Router's WAN interface name |
Build, install, and run the latest OpenSSH Server as a systemd service.
Learn how to send emails through Gmail SMTP with Cloudflare Email Routing in this comprehensive guide.
To proceed with this method, ensure that you have enabled two-factor authentication for your Google account. If you haven't done so already, you can follow the link to set it up → Enable 2FA in your Google account.
The repository for the assignment is public and Github does not allow the creation of private forks for public repositories.
The correct way of creating a private frok by duplicating the repo is documented here.
For this assignment the commands are:
git clone --bare [email protected]:usi-systems/easytrace.git
It happens that there are many standards for storing cryptography materials (key, certificate, ...) and it isn't always obvious to know which standard is used by just looking at file name extension or file content. There are bunch of questions on stackoverflow asking about how to convert from PEM to PKCS#8 or PKCS#12, while many tried to answer the questions, those answers may not help because the correct answer depends on the content inside the PEM file. That is, a PEM file can contain many different things, such as an X509 certificate, a PKCS#1 or PKCS#8 private key. The worst-case scenario is that someone just store a non-PEM content in "something.pem" file.
These are the steps I followed enable VirtualBox on my laptop without disabling UEFI Secure Boot. They're nearly identical to the process described on [Øyvind Stegard's blog][blog], save for a few key details. The images here are borrowed from the [Systemtap UEFI Secure Boot Wiki][systemtap].
src='https://download.virtualbox.org/virtualbox/rpm/fedora/virtualbox.repo'