I'm not going to be maintaining this document anymore. I'm leaving it as-is since much of the FAQ section is still accurate and has yet to be incorporated into other resources.
Use CanI.RootMy.TV to find an exploit for your TV.
| #!/bin/bash | |
| cd / | |
| sudo apt update | |
| echo "deb https://packages.cloud.google.com/apt coral-edgetpu-stable main" | sudo tee /etc/apt/sources.list.d/coral-edgetpu.list | |
| curl https://packages.cloud.google.com/apt/doc/apt-key.gpg | sudo apt-key add - |
I'm not going to be maintaining this document anymore. I'm leaving it as-is since much of the FAQ section is still accurate and has yet to be incorporated into other resources.
Use CanI.RootMy.TV to find an exploit for your TV.
Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-2021-44228)
| # This script will manually rip out all VMware Tools registry entries and files for Windows 2008-2019 | |
| # Tested for 2019, 2016, and probably works on 2012 R2 after the 2016 fixes. | |
| # This function pulls out the common ID used for most of the VMware registry entries along with the ID | |
| # associated with the MSI for VMware Tools. | |
| function Get-VMwareToolsInstallerID { | |
| foreach ($item in $(Get-ChildItem Registry::HKEY_CLASSES_ROOT\Installer\Products)) { | |
| If ($item.GetValue('ProductName') -eq 'VMware Tools') { | |
| return @{ | |
| reg_id = $item.PSChildName; |
| KEYMAPOPTS="us us" | |
| HOSTNAMEOPTS="-n alpine" | |
| INTERFACESOPTS="auto lo | |
| iface lo inet loopback | |
| auto eth0 | |
| iface eth0 inet dhcp | |
| hostname alpine | |
| " | |
| TIMEZONEOPTS="-z UTC" |
| NODE=10.17.0 | |
| wget https://nodejs.org/dist/v$NODE/node-v$NODE-linux-armv6l.tar.xz | |
| tar -xvf node-v$NODE-linux-armv6l.tar.xz | |
| sudo cp -R node-v$NODE-linux-armv6l/* /usr/local/ | |
| rm -rf node-v$NODE-linux-armv6l node-v$NODE-linux-armv6l.tar.xz |
| #!/bin/bash | |
| cd ~ | |
| sudo apt-get update | |
| sudo apt-get install -y git cmake libusb-1.0-0.dev build-essential | |
| cat <<EOF >no-rtl.conf | |
| blacklist dvb_core | |
| blacklist dvb_usb_rtl28xxu |
Steps to change the URL of Rancher installation and switch from a self-signed certificate to a certificate signed by recognized CA.
server-url setting to the new URL:
https://<old_rancher_hostname>/g/settings/advancedserver-url to https://<new_rancher_hostname>https://<old_rancher_hostname>/g/settings/advancedcacerts click context menu -> View in APIvalue field