Probably one of the easiest things you'll ever do with gpg
Install Keybase: https://keybase.io/download and Ensure the keybase cli is in your PATH
First get the public key
keybase pgp export | gpg --import
Next get the private key
RUN apt-get update && apt-get install -y \ | |
packages\ | |
&& rm -rf /var/lib/apt/lists/* |
Probably one of the easiest things you'll ever do with gpg
Install Keybase: https://keybase.io/download and Ensure the keybase cli is in your PATH
First get the public key
keybase pgp export | gpg --import
Next get the private key
$path = "folder" | |
$propflag = "None" | |
$inhflag = [System.Security.AccessControl.InheritanceFlags]::ContainerInherit -bor [System.Security.AccessControl.InheritanceFlags]::ObjectInherit | |
$user = "DOMAIN\user" | |
$acl = get-acl $path | |
$rule = New-Object System.Security.AccessControl.FileSystemAccessRule $user,"FullControl",$inhflag,$propflag,"Allow" | |
$acl.SetAccessRule($rule) | |
$acl | Set-Acl $path |
# hello.txt is a file in the current directory | |
# The group everyone will be added to allow it full control | |
$group = "Everyone" | |
$control = "FullControl" | |
$yesno = "Allow" | |
$acl = get-acl hello.txt | |
$rule = New-Object System.Security.AccessControl.FileSystemAccessRule $group,$control,$yesno | |
$acl.SetAccessRule($rule) |
socat - udp4-listen:8125,fork | tee >(socat - udp-sendto:127.0.0.1:8135) >(socat - udp-sendto:127.0.0.1:8140) |
strComputer = "." | |
Set objWMIService = GetObject("winmgmts:" _ | |
& "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2") | |
Set colNicConfigs = objWMIService.ExecQuery("SELECT * FROM Win32_NetworkAdapterConfiguration WHERE IPEnabled = True") | |
For Each obj in colNicConfigs | |
obj.SetDNSServerSearchOrder(null) | |
if not obj.DHCPEnabled Then | |
obj.EnableDHCP |