- Use
configure-git-credential-hellper.sh
script - You may have to install (Microsoft/Git-Credential-Manager-for-Windows)[https://github.com/Microsoft/Git-Credential-Manager-for-Windows/releases/latest]
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
~$ brew install opencv3 --with-contrib --with-python3 --without-python | |
Warning: opencv: this formula has no --with-contrib option so it will be ignored! | |
Warning: opencv: this formula has no --with-python3 option so it will be ignored! | |
Warning: opencv: this formula has no --without-python option so it will be ignored! | |
==> Downloading https://homebrew.bintray.com/bottles/opencv-3.4.1_5.high_sierra.bottle.2.tar.gz | |
Already downloaded: /Users/reza/Library/Caches/Homebrew/opencv-3.4.1_5.high_sierra.bottle.2.tar.gz | |
==> Pouring opencv-3.4.1_5.high_sierra.bottle.2.tar.gz | |
🍺 /usr/local/Cellar/opencv/3.4.1_5: 600 files, 214.8MB | |
Note: The tricky part is using the Cellar path below rather than /usr/local/opt/opencv/lib/python3.6/site-packages |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
#developed for blog post at http://www.cloudten.com.au/aws-guardduty-intelligent-threat-detection/ | |
from __future__ import print_function | |
import boto3 | |
import json | |
def lambda_handler(event, context): | |
print("Received event: " + json.dumps(event)) | |
try: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# | |
# Assume the given role, and print out a set of environment variables | |
# for use with aws cli. | |
# | |
# To use: | |
# | |
# $ eval $(./iam-assume-role.sh) | |
# |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Ver 2.1, By Reza Hashemi | |
# Automate EC2 instance setup and Install latest Ansible and its dependencies via pip (recommended method) | |
# The cloud init script detects the EC2 instance platform at launch and uses preferred package manager | |
# AWS cloud init script to install ansible on startup, autodetects required package manager | |
# Add as user data inside advanced details at AWS EC2 configure instance details (step 3) | |
# Changes: | |
# Ver 2.1 Tested on Centos 6 | |
# No issues with pynacl and cryptography | |
# Ver 2 Tested on RHEL, Centos 7, Ubuntu, SUSE, Fedora 23-25, Debian |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
gem source -r https://production.s3.rubygems.org | |
gem source -a https://rubygems.org |