- Upgrade to Enterprise edition of Windows 10/11 if you are running Home or Pro.
- You can do this through the Change Edition option in the Extras menu in MAS.
- Open the Group Policy Editor. Search for "Edit Group Policy" in search or run
gpedit.msc.
| # Chapter 1: immediate evaluation with optional composition | |
| @lambda f: not f() | |
| def true() -> bool: | |
| return False | |
| assert true == True # ??? | |
| # Chapter 2: single line composition |
gpedit.msc.| # Check Nahimic service status | |
| $nahimicService = Get-Service -Name "Nahimic service" -ErrorAction SilentlyContinue | |
| if ($nahimicService) { | |
| if ($nahimicService.Status -eq "Running") { | |
| Write-Host "Nahimic service is currently running." -ForegroundColor Yellow | |
| Write-Host "Advice: If you're experiencing issues related to Nahimic or high CPU/RAM usage, consider stopping and disabling the service." | |
| } | |
| else { | |
| Write-Host "Nahimic service is present but currently not running." -ForegroundColor Green |
On systems with UEFI Secure Boot enabled, recent Linux kernels will only load signed modules, so it's about time DKMS grew the capability to sign modules it's building.
These scripts are extended and scriptified variants of https://computerlinguist.org/make-dkms-sign-kernel-modules-for-secure-boot-on-ubuntu-1604.html and https://askubuntu.com/questions/760671/could-not-load-vboxdrv-after-upgrade-to-ubuntu-16-04-and-i-want-to-keep-secur/768310#768310 and add some error checking, a passphrase around your signing key, and support for compressed modules.
dkms-sign-module is a wrapper for the more generic sign-modules which can also be used outside of DKMS.
/root, say /root/module-signing, put the three scripts below in there and make them executable: chmod u+x one-time-setup sign-modules dkms-sign-modulegit config filter.strip-notebook-output.clean 'jupyter nbconvert --ClearOutputPreprocessor.enabled=True --to=notebook --stdin --stdout --log-level=ERROR'
Create a .gitattributes file inside the directory with the notebooks
Add the following to that file:
| # Directory where all configuration will be stored. | |
| CONFIG=./jitsi-meet-cfg | |
| # System time zone. | |
| TZ=Europe/Amsterdam | |
| # Public URL for the web service. | |
| PUBLIC_URL=https://mydomain.org | |
| # Virtual host for nginx proxy |
| ///// TODO : Replace <<LAN_INTERFACE>> with internal bridge or lan interface, replace <<<PPPOE_DIGI_INTERFACE>>> with the pppoe-digi interface | |
| /ipv6 nd | |
| set [ find default=yes ] disabled=yes | |
| add advertise-dns=yes interface=<<LAN_INTERFACE>> | |
| /ipv6 dhcp-client | |
| add add-default-route=yes interface=<<<PPPOE_DIGI_INTERFACE>>> pool-name=pool6 request=address,prefix script=":del\ | |
| ay 5s;\ | |
| \n/ipv6 address remove [find advertise=yes]\ |
| #!/bin/bash | |
| doneit='/var/lib/my_packages' | |
| packages='dnsutils unbound vim nano wget' | |
| if [ -e $doneit ]; then | |
| exit 0; | |
| fi | |
| sudo dpkg --configure -a | |
| apt-get update |
| # Reference: https://www.youtube.com/watch?v=B9dXiKhDVl0 | |
| ## Remember to tailor this to your network! ## | |
| set interfaces openvpn vtun0 config-file /config/auth/midwest.ovpn | |
| set interfaces openvpn vtun0 description 'Private Internet Access' | |
| set interfaces openvpn vtun0 enable | |
| set service nat rule 5000 description PIA | |
| set service nat rule 5000 log disable | |
| set service nat rule 5000 outbound-interface vtun0 |