Sea Shanty 2: d=16,o=5,b=100: 16a, 16p, 16e, 16d, 8c#, 16p, 16c#, 16d, 16e, 16f#, 16g#, 8e, 8p, 16f#, 16p, 16e, 16d, 16c#, 16p, 16c#, 16p, 16b4, 16p, 16c#, 16p, 8d, p
-----BEGIN PGP PUBLIC KEY BLOCK----- | |
mQINBGWXbFMBEADAcCiOGQDOlVFUkoyNX4P7jJHZ4AMaHXKKfuG5gv92KbLBvGfU | |
sG1R+i32h6rmtyMpIjp4vLLxOAPfYIuGdaY30ChVTvRH9m+hP2Ky5sB+LJSrwX9j | |
Jgeh3H4TRm2EqslnY/84HyxxGJRIySebOLi15/O2vROdneTzVItNeaS3J2XQvDaW | |
HJkGLd99IK/bYQnyzCaiTDcvmwQ7bkJUr7ezrOaZmA15X6jyJEs6UAxsBNsv3780 | |
pljDxnZ52u0yItMW//ejw5k/vsKuqBGEv4IiXsbQfLZwnjA1x2VDGZ2a9s4MZRjM | |
JkI1TcYC64psPB01A2RcRXZTDdma7LV5VNHAtMFxdeFt12HKb2096734jYqP6Stg | |
erJF/RcBNir/GK92mzu4fdxO4rDPGy5bliDofsmuA3x3LV4sfK/eoO3hv9Q5Cd+F | |
5vFxA3RN3KjD79QhjSyD5us9nSuEg5MBDHsWTGm6jXXNONPSA+/pKwqwgyVvzP8K |
#!/bin/sh | |
gpg --dearmor -o /etc/apt/trusted.gpg.d/andrew-stclair-keyring.gpg << EndOfMessage | |
-----BEGIN PGP PUBLIC KEY BLOCK----- | |
mQINBGWXbFMBEADAcCiOGQDOlVFUkoyNX4P7jJHZ4AMaHXKKfuG5gv92KbLBvGfU | |
sG1R+i32h6rmtyMpIjp4vLLxOAPfYIuGdaY30ChVTvRH9m+hP2Ky5sB+LJSrwX9j | |
Jgeh3H4TRm2EqslnY/84HyxxGJRIySebOLi15/O2vROdneTzVItNeaS3J2XQvDaW | |
HJkGLd99IK/bYQnyzCaiTDcvmwQ7bkJUr7ezrOaZmA15X6jyJEs6UAxsBNsv3780 | |
pljDxnZ52u0yItMW//ejw5k/vsKuqBGEv4IiXsbQfLZwnjA1x2VDGZ2a9s4MZRjM |
#!/bin/bash | |
echo "Installing required software" | |
apt-get update | |
apt-get install groff man manpages manpages-dev -y | |
echo "Creating output directory if it does not exist" | |
SEARCH_DIR="/usr/share/man/" | |
OUT_DIR="/opt/man" | |
mkdir -p $OUT_DIR |
"""Randomness Validator""" | |
# How many bytes to read | |
BYTES_READ = 50000000 | |
# Devices to check | |
DEVICES = [ | |
"/dev/random", | |
"/dev/urandom" | |
] |
I dont garantee these will always work, nor are they a good way of achieving some level of automation for ubuntu pro, but they worked at time of writing.
Checks if the output of the pro status
command contains the string "Valid until"
# If Ubuntu Pro is Activated
The following are scripts that can help with the use of LUKS encrypted disks, though they are very rudementry and require sudo.
The onlt script you will need is the crypt-format script, it's what creates the encrypted partition or file, the others just mount and unmount, which gnome can do on it's own (Other might be able to as well, but i have tested gnome)
These steps have been tested on MacOS. Linux should be similar if not the same. Good luck on Windows
- If you are already using a GPG key to sign git commits or packages, it's one less key to securely backup.
- GPG keys can be stored on OpenPGP Smart Cards like the YubiKey
# Variables | |
storage = { | |
'prompt': "❯", | |
'username': "root", | |
'hostname': "ubuntu" | |
} | |
# Default 'command not found' command | |
def h_noop(_): |
systemctl start service-{a,b}.service
would be equivalent to systemctl start service-a.service service-b.service
systemctl start srv-{1..4}.service
would be equivalent to systemctl start srv-1.service srv-2.service srv-3.service srv-4.service
If for example you had multiple wireguard services and wanted to enable both the service and path for each
systemctl enable wg{0..3}.{service,path}
would be equivalent to systemctl enable wg0.service wg0.path wg1.service etc...