Home Articles Dial On Demand with WVDial Writing Robust Bash Shell Scripts PostgreSQL User Administration Network Troubleshooting Becoming a X.509 Certificate Authority Automatic Proxy Configuration with WPAD LDAP Basics Bash Prompts David Pashley.com Writing Robust Bash Shell Scripts Many people hack together shell scripts quickly to do simple tasks, but these soon take on a life of their own. Unfortunately shell scripts are full of subtle effects which result in scripts failing in unusual ways. It’s possible to write scripts which minimise these problems. In this article, I explain several techniques for writing robust bash scripts. How often have you written a script that broke because a variable wasn’t set? I know I have, many times. chroot=$1 ... rm -rf $chroot/usr/share/doc If you ran the script above and accidentally forgot to give a parameter, ...
Sign up for a GitHub account Sign in All Gists colby / gist:6ec965c9d751a8cb032c Created September 04, 2014 Code Revisions 1 /.sunken-menu-group /.sunken-menu-contents Embed HTTPS SSH You can clone with HTTPS or SSH . Download Gist /.only-with-full-nav View gist:6ec965c9d751a8cb032c gistfile1.txt Raw File suppressed. Click to show. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 #### My support ticket info 1. `echo foo > /etc/hostname` 2. `cat /etc/hostname` = foo 3. reboot 4. `cat /etc/hostname` = random hostname. It seems the hostname is not sticking after a reboot. This is a brand new server, I've only added a user, installed a few packages, and enabled UFW. I'm trying to change it to 'ide-production', but it chan...
Advertisement Subscribe to RSS Follow me on Twitter Join me on Facebook class="grid_16" #header About the Author Blog Advertising #pgnav 03 Sep 14 by BrianKrebs New data gathered from the cybercrime underground suggests that the apparent credit and debit card breach at Home Depot involves nearly all of the company’s stores across the nation. Evidence that a major U.S. retailer had been hacked and was leaking card data first surfaced Monday on the cybercrime store rescator[dot]cc , the shop that was principally responsible for selling cards stolen in the Target , Sally Beauty , P.F. Chang’s and Harbor Freight credit card breaches. As with cards put up for sale in the wake of those breaches, Rescator’s shop lists each card according to the city, state and ZIP code of the store from which each card was stolen. See this story for examples of this d...
Please wait... Payment processing is in progress. Please wait... Skip navigation Call on 0333 800 18 18 or Contact Us Online Home Shopping Cart International Distributors Blog Search MODA Ladies Golf X Series Remote F Series Remote R1 Push Service Packages Trolleys F Series Bags Tour Bags Lightweight Bags Bags X Series Accessories F1 Lithium Accessories Z Series Accessories Luggage & Bags Accessories X Series Spares F1 Lithium Spares Z Series Spares Spares Shirts & V-Necks Royal Albartross Shoes Clothing Up to £30 £30 to £99 £100 and beyond... Items by Price Trolleys Bags Accessories Spares Clothing Items by Price £10...
Creation date: 07/21/2007 Top Panel Top Panel Left Top Panel Left Top Panel Right StartCom Home StartSSL PKI StartSSL DNS StartSSL WoT F. A. Q. Control Panel Top Panel Right Top Panel StartSSL™ Home StartSSL™ Products » StartSSL™ Free » StartSSL™ Verified » StartSSL™ Extended » StartSSL™ WoT » StartSSL™ Corporate » StartSSL™ Identity » StartSSL™ Distributor » StartSSL™ Partner Comparison Chart How to Enroll How to Install HTML Examples F. A. Q. Heartbleed Policies & Resources Contact StartCom Control Panel ...
無 GPG // Contact // @colby 1FE4 CE8C 283F D7BF 9FED 3584 08AF 2D99 6BC0 23C5 ...
<![endif] Menu About Community FAQ Demos Donate Blog Github mail Try Alpha II Demo Download Source Code Main Points Powerful search & tagging makes your pile of mail managable, whether you have just a few messages, thousands or even millions. Mailpile is designed to be fast and responsive, outperforming "the cloud" even on slow computers. Store your mail on devices you control, your search index is encrypted so if your computer gets stolen, your mail stays secure. OpenPGP signatures and encryption are part of Mailpile's core design, not an afterthought or plugin. It's ironic that most web-mail solutions filter out spam, only to replace it with their own advertisements. Host your install of mailpile on your laptop, desktop, Raspberry PI, server in the cloud, or put it on a USB stick and carry it in your pocket. A modern, fast web-ma...
Skip to content Sign up Sign in This repository Explore Features Enterprise Blog Star 208 Fork 151 brianbianco / redisio /.container /.repohead Code Issues Pull Requests Pulse Graphs HTTPS Subversion You can clone with HTTPS or Subversion . Download ZIP /.repository-sidebar Permalink blob contrib key: blob_contributors:v21:510911f836071fa746de52f66d44c307 branch: master Switch branches/tags /.select-menu-header Branches Tags /.select-menu-tabs /.select-menu-filters 2.0.0_wip /.select-menu-item master /.select-menu-item mitnal_upstart /.select-menu-item Nothing to show /.select-menu-list 2.2.3 /.select-menu-item 2.2.2 /.select-menu-item 2.2.0 /.select-menu-item 1.7.1 /.select-menu-item 1.7.0 /.s...
Aorato /.logo Product Why Aorato DAF How it Works Port Mirroring/TAP Behavioral Learning Security Graph Attack Timeline Optional: Beyond AD Advantages Pricing Demo Labs AD Security 101 Pass-the-Hash Pass-the-Ticket Kerberos TGT Kerberos: The Network Authentication Protocol Reports Company Our Mission About Management Board Investors Advisory Board Customers Press Careers Contact Blog Emergency Contact /.shell-fluid /.page-header The Untold Story of the Target Attack, Step by Step By Tal Be'ery | August 28, 2014 Tweet Today we published our report on the untold story of the Target attack. The full version is available here . In December 2013, in the midst of the busiest shopping season of the year, Target announced that it had been breached by attackers who had gotten away with 70M customers’ Personal Identifiable Informatio...
<![endif] Twitter Search query Search Twitter Remove Verified account @ Suggested users Verified account @ Verified account @ Language: English Bahasa Indonesia Bahasa Melayu Čeština Dansk Deutsch EnglishUK Español Filipino français Italiano Magyar Nederlands Norsk Polski Português română Suomi Svenska Tiếng Việt Türkçe Русский Українська мова עִבְרִית العربية فارسی हिन्दी বাংলা ภาษาไทย 한국어 日本語 简体中文 繁體中文 Have an account? Sign in New to Twitter? Join Today » Sign In Phone, email or username Password Sign in Remember me Forgot password? Already using Twitter via text message? Follow Following Unfollow Blocked Unblock Pending Cancel Chris Wysopal  @ WeldPond 3m Untold story Target attack step by st...
Skip to content Sign up Sign in This repository Explore Features Enterprise Blog Star 841 Fork 203 plasticboy / vim-markdown /.container /.repohead Code Issues Pull Requests Pulse Graphs HTTPS Subversion You can clone with HTTPS or Subversion . Download ZIP /.repository-sidebar Markdown Vim Mode http://plasticboy.com/markdown-vim-mode/ 125 commits 2 branches 0 releases 27 contributors VimL 100% VimL branch: master Switch branches/tags /.select-menu-header Branches Tags /.select-menu-tabs /.select-menu-filters marc-hartstein /.select-menu-item master /.select-menu-item Nothing to show /.select-menu-list Nothing to show /.select-menu-list /.select-menu-modal /.select...
googleoff: all Apple Store Mac iPod iPhone iPad iTunes Support googleon: all Search SiteCatalyst code version: H.8. Copyright 1997-2006 Omniture, Inc. End SiteCatalyst code version: H.8. Apple Leadership Product Images & Info Press Releases We wanted to provide an update to our investigation into the theft of photos of certain celebrities. When we learned of the theft, we were outraged and immediately mobilized Apple’s engineers to discover the source. Our customers’ privacy and security are of utmost importance to us. After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet. None of the cases we have investigated has resulted from any breach in any of Apple’s...