Install IPMItools using your package manager on laptop and target machine. Load the drivers on the target.
modprobe ipmi_devintf
modprobe ipmi_siIf you see the following, drivers are not loaded.
| """ | |
| The most atomic way to train and run inference for a GPT in pure, dependency-free Python. | |
| This file is the complete algorithm. | |
| Everything else is just efficiency. | |
| @karpathy | |
| """ | |
| import os # os.path.exists | |
| import math # math.log, math.exp |
| { | |
| "model": "opus", | |
| "statusLine": { | |
| "type": "command", | |
| "command": "~/.claude/statusline.sh" | |
| } | |
| } |
| #!/bin/sh | |
| set -e -o pipefail | |
| install_nat(){ | |
| local int_iface="$1"; shift | |
| local ext_iface="$1" | |
| if [[ "$(sysctl net.ipv4.ip_forward)" =~ .*0$ ]]; then | |
| echo "Enabling ipv4 forwarding" >&2 |
| #!/bin/bash | |
| # start vault | |
| VAULT_UI=true vault server -dev -dev-root-token-id=root -dev-listen-address=127.0.0.1:8200 | |
| # login as root - DO NOT DO THIS IN PRODUCTION | |
| vault login root | |
| # write some secrets | |
| vault kv put secret/test color=blue number=eleventeen |
| global: | |
| evaluation_interval: 15s | |
| rule_files: | |
| - smokeping.rules | |
| scrape_configs: | |
| - job_name: 'blackbox_icmp' | |
| metrics_path: /probe | |
| params: | |
| module: [icmp] | |
| scrape_interval: 1s |
Source: https://web.archive.org/web/20141216073338/https://gkbrk.com/blog/read?name=reverse_engineering_the_speedtest_net_protocol Author: Gökberk Yaltıraklı
After finishing my command line speed tester written in Rust, I didn't have a proper blog to document this process. A few days ago I wrapped up a simple blogging script in Python so hopefully it works good enough to explain how everything works.
By now I have already figured out the whole protocol for performing a speed test but I will write all the steps that I took so you can learn how to reverse engineer a simple protocol.
The code that I wrote can be found at https://github.com/gkbrk/speedtest-rust.
git clone https://github.com/certbot/certbot /opt/letsencrypt
ln -s /opt/letsencrypt/certbot-auto /usr/bin/certbot
certbot certonly --expand --agree-tos --text --non-interactive \
--standalone \
By @foldleft.bsky.social, see also Unfollow everyone on bsky.app.
https://twitter.com/YOUR_USER_NAME/following// Unfollow everyone on twitter.com, by Jamie Mason (https://twitter.com/fold_left)| #!/bin/bash | |
| # ssh-multi | |
| # D.Kovalov | |
| # Based on http://linuxpixies.blogspot.jp/2011/06/tmux-copy-mode-and-how-to-control.html | |
| # a script to ssh multiple servers over multiple tmux panes | |
| starttmux() { | |
| if [ -z "$HOSTS" ]; then |