I hereby claim:
- I am huskynarr on github.
- I am huskynarr (https://keybase.io/huskynarr) on keybase.
- I have a public key ASD7lL_ZmL3_4V5GCgIpEi06_dMjOrI9dfNnIWLAHGYjNgo
To claim this, I am signing this object:
| #!/usr/bin/env bash | |
| # ai-list — zeigt verbreitete AI & Coding CLIs an (Installed / Not Installed) | |
| # Flags: | |
| # --help | |
| # --install-tool <name> # ein CLI-Tool installieren (npm Fallback) | |
| # --install-tools-all # alle fehlenden CLIs installieren | |
| # --dry-run # nur zeigen, was ausgeführt würde (keine Änderungen) | |
| # sudo install -m 0755 /home/huskynarr/scripts/ai-list /usr/local/bin/ai-list | |
| # which ai-list |
| import xml.etree.ElementTree as ET | |
| import requests | |
| import datetime | |
| import xmlrpc.client | |
| # FRITZ!Box Konfiguration | |
| FRITZBOX_URL = "http://fritz.box" | |
| USERNAME = "fritzuser" | |
| PASSWORD = "passwort" | |
| CALLLIST_URL = f"{FRITZBOX_URL}/cgi-bin/webcm?getpage=../html/de/menus/menu2.html&var:menu=fon&var:submenu=calllist" |
| # Überprüfen, ob das Skript mit administrativen Rechten ausgeführt wird | |
| if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { | |
| Write-Output "Das Skript erfordert Administratorrechte. Bitte als Administrator ausführen." | |
| exit | |
| } | |
| # Verzeichnis und Phase-Datei zur Steuerung der Skriptausführung definieren | |
| $phaseDir = "C:\temp" | |
| $phaseFile = Join-Path $phaseDir "UpdateScriptPhase.txt" |
| #!/bin/bash | |
| # Farbdefinitionen | |
| BLUE='\033[0;34m' | |
| GREEN='\033[0;32m' | |
| YELLOW='\033[1;33m' | |
| CYAN='\033[0;36m' | |
| RED='\033[0;31m' | |
| NC='\033[0m' # Keine Farbe | |
| BOLD='\033[1m' |
| # I claim this list together from: from https://www.reddit.com/r/pihole/comments/6qmpv6/blacklists_for_lg_webos_tvs/ , https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/SmartTV.txt and others. | |
| # Some elements are self-explanatory, so the sub-sub domain for the respective countries. A lot is self-explanatory, if you like you can sort the services correctly, I was too lazy for that. | |
| 0.0.0.0 ad.lgappstv.com | |
| 0.0.0.0 smartshare.lgtvsdp.com | |
| 0.0.0.0 ibis.lgappstv.com | |
| 0.0.0.0 lgad.cjpowercast.com.edgesuite.net | |
| 0.0.0.0 ngfts.lge.com | |
| # non us |
| # Generate a new pgp key: (better to use gpg2 instead of gpg in all below commands) | |
| gpg --gen-key | |
| # maybe you need some random work in your OS to generate a key. so run this command: `find ./* /home/username -type d | xargs grep some_random_string > /dev/null` | |
| # check current keys: | |
| gpg --list-secret-keys --keyid-format LONG | |
| # See your gpg public key: | |
| gpg --armor --export YOUR_KEY_ID | |
| # YOUR_KEY_ID is the hash in front of `sec` in previous command. (for example sec 4096R/234FAA343232333 => key id is: 234FAA343232333) |
I hereby claim:
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object: