- Install
restic
andautorestic
sudo mkdir -p /var/cache/restic
- Set up
/etc/autorestic.yml
roughly as follows:
backends:
mybackend:
# Your backend options here, see the documentation
global:
all:
cache-dir: /var/cache/restic
restic
and autorestic
sudo mkdir -p /var/cache/restic
/etc/autorestic.yml
roughly as follows:backends:
mybackend:
# Your backend options here, see the documentation
global:
all:
cache-dir: /var/cache/restic
Курс от Тиькофф Журнала про инвестиции. Про основы основ.
https://journal.tinkoff.ru/pro/invest/
Курс "Финансовые рынки и институты" от ВШЭ (2014). Примеры немного старые, но теоретическая информация подробная.
https://www.coursera.org/learn/finansovye-rynki/home/info
Курсы по экономике на Khan Academy (непроверено)
https://www.khanacademy.org/economics-finance-domain
⚠️ Note 2023-01-21
Some things have changed since I originally wrote this in 2016. I have updated a few minor details, and the advice is still broadly the same, but there are some new Cloudflare features you can (and should) take advantage of. In particular, pay attention to Trevor Stevens' comment here from 22 January 2022, and Matt Stenson's useful caching advice. In addition, Backblaze, with whom Cloudflare are a Bandwidth Alliance partner, have published their own guide detailing how to use Cloudflare's Web Workers to cache content from B2 private buckets. That is worth reading,
/** | |
Decode a php serialized value to json. This function only supports basic | |
data types: | |
- arrays (will always become a json object) | |
- booleans | |
- integers | |
- floats | |
- strings | |
- NULL | |
The php_unserialize(text) function is a helper function which extracts the first value |
curl
to get the JSON response for the latest releasegrep
to find the line containing file URLcut
and tr
to extract the URLwget
to download itcurl -s https://api.github.com/repos/jgm/pandoc/releases/latest \
| grep "browser_download_url.*deb" \
| cut -d : -f 2,3 \
| tr -d \" \
### | |
### | |
### UPDATE: For Win 11, I recommend using this tool in place of this script: | |
### https://christitus.com/windows-tool/ | |
### https://github.com/ChrisTitusTech/winutil | |
### https://www.youtube.com/watch?v=6UQZ5oQg8XA | |
### iwr -useb https://christitus.com/win | iex | |
### | |
### OR take a look at | |
### https://github.com/HotCakeX/Harden-Windows-Security |
git-prebase improves on 'git rebase -i' by adding information per commit regarding which files it touched.
Add the executable to your path and git will automatically expose it as
@"%SystemRoot%\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -InputFormat None -ExecutionPolicy Bypass -Command "iex ((New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install.ps1'))" && SET "PATH=%PATH%;%ALLUSERSPROFILE%\chocolatey\bin" | |
choco feature enable -n allowGlobalConfirmation | |
choco install 7zip /y | |
choco install 7zip.install /y | |
choco install ARMClient /y | |
choco install audacity /y | |
choco install audacity-lame /y | |
choco install autohotkey /y | |
choco install autohotkey.install /y |