cd /lib/firmware/
wget http://palosaari.fi/linux/v4l-dvb/firmware/MN88472/02/latest/dvb-demod-mn88472-02.fw
cd /lib/firmware/
wget http://palosaari.fi/linux/v4l-dvb/firmware/MN88472/02/latest/dvb-demod-mn88472-02.fw
Slowly being moved to a Raspberry Pi.
Stay tuned………
cat /etc/lighttpd/conf-available/10-vhost.conf
server.modules += ( "mod_openssl" ) $SERVER["socket"] == "[2404:9400:213c:6b01:0000:0000:0000:0001]:443" { ssl.engine = "enable" ssl.privkey= "/etc/letsencrypt/live/1.mygeekvps.net/privkey.pem" ssl.pemfile = "/etc/letsencrypt/live/1.mygeekvps.net/cert.pem" ssl.ca-file= "/etc/letsencrypt/live/1.mygeekvps.net/chain.pem" ssl.cipher-list = "HIGH" server.document-root = "/var/www/html1" } $SERVER["socket"] == "[2404:9400:213c:6b01:0000:0000:0000:0002]:443" { ssl.engine = "enable" ssl.privkey= "/etc/letsencrypt/live/2.mygeekvps.net/privkey.pem" ssl.pemfile = "/etc/letsencrypt/live/2.mygeekvps.net/cert.pem" ssl.ca-file= "/etc/letsencrypt/live/2.mygeekvps.net/chain.pem" ssl.cipher-list = "HIGH" server.document-root = "/var/www/html2" } $SERVER["socket"] == "[2404:9400:213c:6b01:0000:0000:0000:0003]:443" { ssl.engine = "enable" ssl.privkey= "/etc/letsencrypt/live/3.mygeekvps.net/privkey.pem" ssl.pemfile = "/etc/letsencrypt/live/3.mygeekvps.net/cert.pem" ssl.ca-file= "/etc/letsencrypt/live/3.mygeekvps.net/chain.pem" ssl.cipher-list = "HIGH" server.document-root = "/var/www/html3" }
/etc/network/interfaces
iface eth0 inet6 static address 2404:9400:213c:6b01:0000:0000:0000:0001/128 # use SLAAC to get global IPv6 address from the router # we may not enable ipv6 forwarding, otherwise SLAAC gets disabled autoconf 1 accept_ra 2 iface eth0 inet6 static address 2404:9400:213c:6b01:0000:0000:0000:0002/128 # use SLAAC to get global IPv6 address from the router # we may not enable ipv6 forwarding, otherwise SLAAC gets disabled autoconf 1 accept_ra 2 iface eth0 inet6 static address 2404:9400:213c:6b01:0000:0000:0000:0003/128 # use SLAAC to get global IPv6 address from the router # we may not enable ipv6 forwarding, otherwise SLAAC gets disabled autoconf 1 accept_ra 2
#!/usr/bin/env python3 import mysql.connector weblist = ["ericafox", "ericascott", "ericastevens", "samarafox", "samarastevens", "williamscott", "woodytheduck"] mydb = mysql.connector.connect( host="localhost", user="superuser", passwd="superuserpassword" ) mycursor = mydb.cursor() for site in weblist: mycursor.execute("CREATE DATABASE " + site)

nano /etc/wpa_supplicant/wpa_supplicant-wlo1.conf
ctrl_interface=/run/wpa_supplicant update_config=1 network={ ssid="My SSID" psk=4a11d6d1d48bd83ae9f0dc4f804dddc60a91782653fc883c0b9f23c8a2db72ef }
systemctl enable wpa_supplicant@wlo1.service
mv /etc/network/interfaces /etc/network/interfaces.save
systemctl enable systemd-networkdnano /etc/systemd/network/lan0.network
[Match] Name=enp0s3 [Network] DHCP=yes [DHCP] ClientIdentifier=mac
systemctl start systemd-networkd
Node 8
'use strict'; exports.handler = (event, context, callback) => { // Extract the request from the CloudFront event that is sent to Lambda@Edge var request = event.Records[0].cf.request; // Extract the URI from the request var olduri = request.uri; // Match any '/' that occurs at the end of a URI. Replace it with a default index var newuri = olduri.replace(/\/$/, '\/index.html'); // Log the URI as received by CloudFront and the new URI to be used to fetch from origin console.log("Old URI: " + olduri); console.log("New URI: " + newuri); // Replace the received URI with the URI that includes the index page request.uri = newuri; // Return to CloudFront return callback(null, request); };
Node 8
'use strict'; exports.handler = (event, context, callback) => { //Get contents of response const response = event.Records[0].cf.response; const headers = response.headers; //Set new headers headers['strict-transport-security'] = [{key: 'Strict-Transport-Security', value: 'max-age=63072000; includeSubdomains; preload'}]; headers['content-security-policy'] = [{key: 'Content-Security-Policy', value: "default-src 'self' 'unsafe-inline' 'unsafe-eval'"}]; headers['x-content-type-options'] = [{key: 'X-Content-Type-Options', value: 'nosniff'}]; headers['x-frame-options'] = [{key: 'X-Frame-Options', value: 'DENY'}]; headers['x-xss-protection'] = [{key: 'X-XSS-Protection', value: '1; mode=block'}]; headers['referrer-policy'] = [{key: 'Referrer-Policy', value: 'same-origin'}]; headers['x-custom-header'] = [{key: 'X-Custom-Header', value: 'SH_V1'}]; headers['cache-control'] = [{key: 'Cache-Control', value: 'no-store'}]; headers['feature-policy'] = [{key: 'Feature-Policy', value: "microphone 'self'"}]; headers['expect-ct'] = [{key: 'Expect-CT', value: 'enforce, max-age=30'}]; //Return modified response callback(null, response); };