- DigitalOcean Ubuntu 24.04 LTS server with root or sudo access
- Domain name pointed to your server's IP address
- Cloudflare account with domain added
Discover gists
| i | |
| me | |
| my | |
| myself | |
| we | |
| our | |
| ours | |
| ourselves | |
| you | |
| your |
| """ | |
| The most atomic way to train and run inference for a GPT in pure, dependency-free Python. | |
| This file is the complete algorithm. | |
| Everything else is just efficiency. | |
| @karpathy | |
| """ | |
| import os # os.path.exists | |
| import math # math.log, math.exp |
| /* | |
| This is the c configuration file for the keymap | |
| Copyright 2012 Jun Wako <wakojun@gmail.com> | |
| Copyright 2015 Jack Humbert | |
| This program is free software: you can redistribute it and/or modify | |
| it under the terms of the GNU General Public License as published by | |
| the Free Software Foundation, either version 2 of the License, or | |
| (at your option) any later version. | |
| This program is distributed in the hope that it will be useful, | |
| but WITHOUT ANY WARRANTY; without even the implied warranty of |
As a security professional, it is important to conduct a thorough reconnaissance. With the increasing use of APIs nowadays, it has become paramount to keep access tokens and other API-related secrets secure in order to prevent leaks. However, despite technological advances, human error remains a factor, and many developers still unknowingly hardcode their API secrets into source code and commit them to public repositories. GitHub, being a widely popular platform for public code repositories, may inadvertently host such leaked secrets. To help identify these vulnerabilities, I have created a comprehensive search list using powerful search syntax that enables the search of thousands of leaked keys and secrets in a single search.
(path:*.{File_extension1} OR path:*.{File_extension-N}) AND ({Keyname1} OR {Keyname-N}) AND (({Signature/pattern1} OR {Signature/pattern-N}) AND ({PlatformTag1} OR {PlatformTag-N}))
**1.
GlobalProtect is a secure VPN solution developed by Palo Alto Networks. It provides encrypted remote access to corporate networks, allowing users to securely connect to internal resources from anywhere in the world. GlobalProtect is widely used by enterprises to ensure data protection, user authentication, and compliance with corporate security policies.
The VPN works by creating an encrypted tunnel between the user’s device and the organization’s firewall or gateway. Once connected, users can access internal applications, file servers, intranet websites, and other protected services as if they were physically inside the company network.
GlobalProtect supports multiple operating systems, including Windows, macOS, Linux, Android, and iOS, and integrates with modern authentication methods such as certificates, multi-factor authentication (MFA), and single sign-on (SSO).
See also:
| Service | Type | Storage | Limitations |
|---|---|---|---|
| Amazon DynamoDB | 25 GB | ||
| Amazon RDS | |||
| Azure SQL Database | MS SQL Server | ||
| 👉 Clever Cloud | PostgreSQL, MySQL, MongoDB, Redis | 256 MB (PostgreSQL) | Max 5 connections (PostgreSQL) |
See how a minor change to your commit message style can make a difference.
git commit -m"<type>(<optional scope>): <description>" \ -m"<optional body>" \ -m"<optional footer>"
| { | |
| "$schema": "http://json-schema.org/draft-07/schema#", | |
| "title": "Claude Code Settings", | |
| "description": "Configuration schema for Claude Code settings.json files", | |
| "type": "object", | |
| "additionalProperties": false, | |
| "properties": { | |
| "$schema": { | |
| "type": "string", | |
| "description": "JSON Schema reference for this configuration file" |