Internet search is basically useless now, I heard it described as “no longer a search engine, but an add serving platform”. The search results have deteriorated to the point where it is even worse than an add platform it is now just a market place.
If you are use to working with python virtual environments you may want to have the same experience when working with nodejs. For that you can use the python package nodenv
It is more complicated to eat chilli crab than to cook it. This is an easy recipe. Prepare the chilli paste earlier (take about 30 mins). When you are ready to eat, it only takes 10 minutes to cook.
My HF3520 had a mainboard failure and my attempts to repair it also failed. I have salvaged some of the components. Trying to save the environment by keeping them out of landfill in the hope someone else needs the parts
Last Updated: Jan 6, 2023
New 2022 M1 Macbook external display flickers when plugged into the Dell WD19TB docking station.
This is a bunch of random notes on installing Arch Linux on a ThinkPad X1 Carbon 6th Gen.
This is a bunch of random tips on Arch Linux.
It is possible to send your own custom payload to the Pagerduty Cloudwatch integration from a Lambda (instead of via a Cloudwatch alarm). Pagerduty does not document the internals but if you publish a custom message to the SNS topic that you have a HTTPS subscription to Pager duty following these simple rules you will see the event in Pagerduty.
How to send payload to AWS Lambda from Cloudwatch scheduled event.
These scones take max 30 mins to prep and cook and are very simple and enjoyable.
I added an M5 Paper to my collection of dev boards and decided to make a basic calculator to teach my son to count. Since he is only a few months old he mostly uses it as an expensive teething device.
Handy tips and notes about Python 30.8 10, 11 and beyond.
Trust on Cloud have open sourced their AWS S3 threat model, this release is a great tool to make sense of the “shared responsibility model” and what “responsibility” means for AWS customers.
In an on premise network it is typical to do some type of topology discovery via the MIB-II SNMP tables of all your network gear and then use ICMP to ping each of the discovered routers or switches respective management interfaces to validate connectivity and contribute to intelligence when parts of the network go dark and speed up root cause analysis.
The CA trust store is how a TLS client establish trust with the servers offered certificates. Curl uses openssl and Python uses its own store (like Java). The store on my system is located here:
How to deal with the error: “The maximum number of rules per security group has been reached.”
My setup is using the docker compose file and a local build of the docker image
(since docker hub image is years old). Here is a dark theme (solarized) for the
CSS. Just paste this over your
stringer/app/assets/stylesheets/application.css file. I did not spend much
time on it but it looks good enough for my taste.
In Italy a society; Associazione Verace Pizza Napoletana makes the rules when it comes to every aspect of the Naples pizza and they describe the rules of a Naples pizza in extreme technical detail here this is a great read if you are a pizza nerd and it details the exact procedure to cook a perfect Napoletana pizza.
Chicken Thigh (With or without skin / bone - to taste)
I wanted to upgrade the version of pandas that comes with AWS Sagemaker Notebook to > 1.1 because this simplify handling of group by with null or NaN values.
These are mediterranean style garlic chilli prawns, normally I double the garlic and chilli for this recipe and the oil is so good to dip with warm fresh crusty bread.
To get logstash talking to the Open Distro Elasticsearch the first thing that should be understood is that open distro only works with the OSS (Apache 2.0 Licensed) edition of the Elastic tools and not the Elastic licensed edition (Xpack).
Use open source project mitmproxy and have visibility into what iOS apps (or anything else) are sending back to their mother ship.
Mostly notes to self on how to deploy and architecture / setup. Inspired by https://github.com/vincentbernat/vincent.bernat.ch
You can conveniently browse the SES mail in S3 using this tool
To get the CUR reports into elastic search:
The problem is solved by removing the leading slash after the podname colon separator:
Resource policy are typically used to allow cross account access for resources where it is supported some of which include:
When using multithreading in Python with AWS boto to get a session I was randomly hitting this error:
Can I associate multiple private hosted zones with the same domain name to the same VPC?
Today I learnt that AWS CloudTrail does not log requests that are denied by VPC endpoint policy. The reason for this is that it would allow an attacker to exfiltrate data via CloudTrail and the VPC endpoint outside of the VPC! (For example by sending lots of requests with data you want to extract in the request fields)
I need to connect to my WSL2 container from other machines on the network over SSH:
My container is assigned
172.24.208.2 and I will map 5022 to 22 on the host.
Find all requests matching URL
Spent too much time troubleshooting the following error but I happy to find the solution for this error:
This is an AutoHotKey script for pasting the clipboard contents by simulating hardware keystrokes. It also fixes for stuck keys such as control and shift keys after the shortcut runs which are useful when pasting into a KVM, VMware console, RDP or Citrix session where latency is high or clipboard support doesn’t exist.
Getting the error:
Stumbled on an interesting new feature based on a commit in the AWS .net SDK which may have been released early.
I am working on a project with the STM32F103C8 and I not using a dev board but rather a breakout board called SMT Test Socket TQFP-48 Breakout AKA NO. SA248 XELTEK
Tomu is a USB chip with capacitive sense buttons that fits inside a USB port and has a ARM EFM32HG309 MCU and a few LEDs inside.
This script will automatically ping scan the subnet your host is connected to. To do this it does the following:
Here is a true story about our safari trip in South Africa and our harrowing encounter with leopards and hyenas, as we narrowly escaped death in the long grass.
I have a legacy application that needs to connect over a proxy such as squid
or HAProxy to a service on the internet.
In other words I want to use
netcat (nc) or something similar to proxy
traffic through a proxy using the proxy protocol (or CONNECT method).
The following error message occurs when you either
I stumbled upon on an Ebay bargain I could not resist, thankfully my old boss and good friend Wilhelm kindly allowed me to purchase a VNX 7600 with all the drives, and run the monster in a closet in our office! W.W also let me spend some time exploring the internals of the VNX. The original owner shuffled all the drives around including the sacred first 5 drives that contain the FLARE OS rendering it useless.
When trying to charge a LiPo that had been drained to 0 voltage I was getting an error:
I want to build a relay based 8 bit adder for fun, kind of like a puzzle or playing chess to exercise a different way of thinking. Also the clacking of the relay is quite soothing.
Just keep decreasing the packet size with
-s flag on the
When trying to get the Task Scheduler to run regardless of if a user is logged on or not.
Everything displayed in the Windows user session is ultimately controlled by the Windows GDI Any everything displayed in a users session must run as that user (without modifying kernel or display drivers). Python provides a convenient API to control GDI.