I like to use the .cbz format to read manga because it’s very simple.
It’s just a .zip file containing the images for the manga pages with its extension changed to .cbz .
(There’s also .cb7 and .cbr that use 7z or RAR archives.)
Images are read in alphabetical file name order by the e-reader and displayed on screen.
That’s just it.
| # run as: | |
| # podman run --rm -ti --mount=type=bind,src=$HOME/.abcde.conf,dst=/root/.abcde.conf --device=/dev/sr0 goncalor/abcde | |
| FROM alpine AS musicbrainz-build | |
| RUN apk --no-cache add git build-base pkgconf libdiscid-dev perl-utils perl-dev | |
| RUN git clone --depth=1 https://github.com/goncalor/perl-musicbrainz-discid | |
| WORKDIR perl-musicbrainz-discid | |
| RUN perl Makefile.PL |
| FROM alpine | |
| WORKDIR /app | |
| RUN adduser -h /app -D user | |
| RUN apk add tinyssh ucspi-tcp6 | |
| USER user | |
| RUN tinysshd-makekey ./sshkeydir |
| # create a disk | |
| vboxmanage createmedium --filename <name>.vmdk --size=512 --variant=<Standard|Fixed|Stream|...> --format=VMDK | |
| # Standard is the default disk image type, which has a dynamically allocated file size. | |
| # Fixed uses a disk image that has a fixed file size. | |
| # Stream optimizes the disk image for downloading. This value is valid for VMDK disk images only. | |
| # create raw disk image | |
| sudo vboxmanage createmedium --filename=<name>.vmdk --variant=RawDisk --format=VMDK --property=RawDrive=/dev/sXY | |
| sudo chown <user>:<user> <name>.vmdk | |
| sudo chown root:<user> /dev/sXY |
-
Create
myunit.service. Only[Service]is needed, with anExecStart= -
Create
myunit.timer. It needs[Timer]with anOnCalendar=or similar. It needs[Install]withWantedBy=timers.target -
Enable both units. The
.serviceunit will issue a warning due to missing[Install]. This is not a problemsystemctl --user enable $PWD/myunit.service systemctl --user enable $PWD/myunit.timer
| [package] | |
| name = "sequoia-test" | |
| version = "0.1.0" | |
| edition = "2021" | |
| [[bin]] | |
| name = "sequoia-test-password" | |
| path = "password.rs" | |
| [[bin]] |
Nmap currently has no way to detect whether the service running on TCP port 1801 is [Microsoft Message Queuing (MSMQ)][wikipedia_msmq]. The file msmq-service-probe here has been developed to give Nmap the capability to detect MSMQ. The objective is to help identify assets with MSMQ exposed, that may be vulnerable to [CVE-2023-21554][nist_cve_2023_21554], aka QueueJumper.
This works by sending a MSMQ packet to port 1801 and checking if the response matches an expected fingerprint.
You can run this probe as follows:
| #!/usr/bin/env python3 | |
| # Collapses subnets and/or IPs into the smallest possible set of subnets | |
| import sys | |
| import ipaddress | |
| if len(sys.argv) != 2: | |
| print("Usage: {} <file>".format(sys.argv[0])) | |
| sys.exit(-1) | |
| with open(sys.argv[1]) as f: |
| just a test | |
| wivykwfs6@nullmbx.net | |
| don't send mail |
| FROM alpine | |
| RUN apk --no-cache add go chromium | |
| RUN go get github.com/shelld3v/aquatone | |
| #RUN useradd -m -d /app user | |
| WORKDIR /app | |
| #USER user |