Skip to content

Instantly share code, notes, and snippets.

@tcfitzgerald
tcfitzgerald / adding-tailscale-to-edgerouter.md
Created December 29, 2024 20:19 — forked from lg/adding-tailscale-to-edgerouter.md
Add tailscale to an EdgeRouter and surviving system upgrade

Adding tailscale to an EdgeRouter (and surviving system upgrades)

I suggest you run sudo bash on all of these so you're the root user.

Installing

  1. Download tailscale and put the files in /config/. Find the latest stable or unstable version for your EdgeRouter's processor (ex. ER4 is mips and ERX is mipself)
sudo bash    # if you havent already
@tcfitzgerald
tcfitzgerald / interview_1.md
Last active December 22, 2022 16:56
Interview with ChatGPT

For this scenario I'd like you to imagine that I am interviewing you for an Application Developer position at Widget Co. LTD. I am JOHN SMITH, a Lead Application Developer. You are JANE DOE, an applicant applying to work at Widget Co. LTD as an Application Developer.

Can you tell me a little bit about why you are interested in this job?

Chatbot:

Sure, John. I am very interested in the job of an Application Developer at Widget Co. LTD because it would allow me to use my skills and knowledge to create innovative and useful applications that can help improve people's lives. I am particularly interested in working for Widget Co. LTD because of the company's reputation for developing high-quality products and its commitment to using cutting-edge technology. I am also excited about the opportunity to work with a team of talented and experienced developers, which I believe would be a great learning experience for me. Overall, I am confident that this job would be a great fit for me and would allow me to make a

@tcfitzgerald
tcfitzgerald / litgation.md
Last active December 5, 2022 18:39
ChatGPT PHP Class Ligitation with OpenAPI 3.0 spec

Write a php class for a litigation case.

class LitigationCase {
  private $caseNumber;
  private $plaintiff;
  private $defendant;
  private $filingDate;
  private $status;
@tcfitzgerald
tcfitzgerald / openssl-self-signed-san-certificate.md
Created August 26, 2018 20:30 — forked from jdeathe/openssl-self-signed-san-certificate.md
How to generate a self-signed SAN SSL/TLS certificate using openssl

How to generate a self-signed SAN SSL/TLS certificate using openssl

Generating a self-signed certificate is a common taks and the command to generate one with openssl is well known and well documented. Generating a certificate that includes subjectAltName is not so straght forward however. The following example demonstrates how to generate a SAN certificate without making a permanent change to the openssl configuration.

Generate a list of all required DNS names, (Note: CN will be discarded).

$ export SAN="DNS:www.domain.localdomain,DNS:domain.localdomain"
@tcfitzgerald
tcfitzgerald / openssl.MD
Created August 26, 2018 20:30 — forked from jchandra74/openssl.MD
HOWTO: Create Your Own Self-Signed Certificate with Subject Alternative Names Using OpenSSL in Ubuntu Bash for Window

HOWTO: Create Your Own Self-Signed Certificate with Subject Alternative Names Using OpenSSL in Ubuntu Bash for Window

Overview

My main development workstation is a Windows 10 machine, so we'll approach this from that viewpoint.

Recently, Google Chrome started giving me a warning when I open a site that uses https and self-signed certificate on my local development machine due to some SSL certificate issues like the one below:

Self-Signed SSL Issue in Chrome