This is an OpenPGP proof that connects my OpenPGP key to this Github account. For details check out https://keyoxide.org/guides/openpgp-proofs
[Verifying my OpenPGP key: openpgp4fpr:989EB937BDF4A5CD65470204F2F9BE4C3D8E4F53]
This is an OpenPGP proof that connects my OpenPGP key to this Github account. For details check out https://keyoxide.org/guides/openpgp-proofs
[Verifying my OpenPGP key: openpgp4fpr:989EB937BDF4A5CD65470204F2F9BE4C3D8E4F53]
Here we create the master key. We want only Certify capability: we use the master key only to create the subkeys, Sign - Encrypt - Authenticate capabilities will be assigned to the subkeys.
Run the following command to start the master key generation process. Select the set your own capabilities creation process (type 8)
▶ gpg --full-generate-key --expert
gpg (GnuPG) 2.2.9; Copyright (C) 2018 Free Software Foundation, Inc.
This content has moved.
Please go to bagder/TRRprefs for the current incarnation of the docs, and please help us out polish and maintain this documentation!
| #!/usr/bin/php | |
| <?php | |
| declare(strict_types = 1); | |
| // require_once ('hhb_.inc.php'); | |
| hhb_init (); | |
| if ($argc !== 3) { | |
| fprintf ( STDERR, "usage: %s timestamp url\n", $argv [0] ); | |
| fprintf ( STDERR, "example: %s 20091012061648 http://www.p4w.se\n", $argv [0] ); | |
| die ( 1 ); | |
| } |
| Hi All! | |
| I've recently launched a tool that wraps many of the commands here with a user interface. This desktop application is currently available for macOS. There's a roadmap outlining planned features for the near future. | |
| Feel free to request any features you'd like to see, and I'll prioritize them accordingly. | |
| One of the most important aspects of this application is that every command executed behind the scenes is displayed in a special log section. This allows you to see exactly what’s happening and learn from it. | |
| Here's the link to the repository: https://github.com/Pulimet/ADBugger | |
| App Description: | |
| ADBugger is a desktop tool designed for debugging and QA of Android devices and emulators. It simplifies testing, debugging, and performance analysis by offering device management, automated testing, log analysis, and remote control capabilities. This ensures smooth app performance across various setups. |
I hereby claim:
To claim this, I am signing this object:
| <a href="/categories/{{ $name | urlize }}">{{ replace $name "-" " " }}</a> |
| Worker = (function(){ | |
| var nativeWorker = Worker; | |
| var BlobWorker = function(){ | |
| this.queuedCallList = []; | |
| this.trueWorker = null; | |
| this.onmessage = null; | |
| } | |
| BlobWorker.prototype.postMessage = function(){ | |
| if(this.trueWorker) |
GPG subkeys marked with the "authenticate" capability can be used for public
key authentication with SSH. This is done using gpg-agent which, using the
--enable-ssh-support option, can implement the agent protocol used by SSH.
A working gpg2 setup is required. It may be possible to use gpg 1.4 but with gpg-agent compiled from gpg2. If you are using OS X 10.9 (Mavericks) then you may find the instructions [here][1] useful.
| location /redirect/ { | |
| rewrite ^/redirect/(.*)$ /redirect/index.php?id=$1 last; | |
| } |