Skip to content

Instantly share code, notes, and snippets.

@Klerith
Klerith / instalaciones.md
Last active December 7, 2025 00:52
Instalaciones recomendadas - Curso de Angular de cero a experto
@Mishco
Mishco / content.md
Last active October 24, 2025 08:11
Setup HashiCorp Vault on docker

Setup HashiCorp Vault on docker

Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault is primarily used in production environments to manage secrets. Vault is a complex system that has many different pieces. There is a clear separation of components that are inside or outside of the security barrier. Only the storage backend and the HTTP API are outside, all other components are inside the barrier.

Vault_architecture

Figure 1: Architecture of Vault and Spring App (Click to enlarge)

The storage backend is untrusted and is used to durably store encrypted data. When the Vault server is started, it must be provided with a storage backend so that data is available across restarts. The HTTP API similarly must be started by the Vault server on start so that clients can interact with it.

@danhixon
danhixon / Download m3u8 video stream to file.txt
Last active May 23, 2020 15:46
Download m3u8 video stream to file
Requirements: VLC
1. Get the master.m3u8 text, use curl or Paw or just download the file and open with a text editor.
2. Find the url of the version you want
#EXT-X-STREAM-INF:PROGRAM-ID=1,BANDWIDTH=1828000,RESOLUTION=1280x720
https://cdn.videoservice.com/services/mobile/streaming/index/rendition.m3u8?assetNumber=392392
3. Download that file.
4. Launch VLC, Choose File -> Convert/Stream from the menu
5. Drag the "rendition.m3u8" file onto that window, choose your settings and click save.
@lgg
lgg / keepass-file-format-explained.md
Last active October 19, 2025 16:10
Keepass file format explained

Keepass file format explained

I’m currently working (I’m just at the beginning, and I’m quite slow) on a personal project that will use Keepass files (kdb and kdbx).
I tried to find some documentation about .kdb and .kdbx format, but I didn’t find anything, even in the Keepass official website. I you want to know how these file formats are structured, you must read Keepass’s source code. So I wrote this article that explains how Keepass file format are structured, maybe it will help someone.

@denisemauldin
denisemauldin / .block
Created October 12, 2017 20:16
D3.js Drag and Drop, Zoomable, Panning, Collapsible Tree with auto-sizing.
license: mit
@wojteklu
wojteklu / clean_code.md
Last active December 6, 2025 13:31
Summary of 'Clean code' by Robert C. Martin

Code is clean if it can be understood easily – by everyone on the team. Clean code can be read and enhanced by a developer other than its original author. With understandability comes readability, changeability, extensibility and maintainability.


General rules

  1. Follow standard conventions.
  2. Keep it simple stupid. Simpler is always better. Reduce complexity as much as possible.
  3. Boy scout rule. Leave the campground cleaner than you found it.
  4. Always find root cause. Always look for the root cause of a problem.

Design rules

@heathermiller
heathermiller / scala-cheatsheet.md
Last active December 1, 2025 07:48
Scala Cheatsheet

This cheat sheet originated from the forum, credits to Laurent Poulain. We copied it and changed or added a few things.

Evaluation Rules

  • Call by value: evaluates the function arguments before calling the function
  • Call by name: evaluates the function first, and then evaluates the arguments if need be
    def example = 2      // evaluated when called
    val example = 2      // evaluated immediately
@paulirish
paulirish / how-to-view-source-of-chrome-extension.md
Last active November 29, 2025 17:23
How to view-source of a Chrome extension

Option 1: Command-line download extension as zip and extract

extension_id=jifpbeccnghkjeaalbbjmodiffmgedin   # change this ID
curl -L -o "$extension_id.zip" "https://clients2.google.com/service/update2/crx?response=redirect&os=mac&arch=x86-64&nacl_arch=x86-64&prod=chromecrx&prodchannel=stable&prodversion=44.0.2403.130&x=id%3D$extension_id%26uc" 
unzip -d "$extension_id-source" "$extension_id.zip"

Thx to crxviewer for the magic download URL.

@stephenlb
stephenlb / chatroom-security.md
Last active November 21, 2021 16:27
Chatroom Security

Chat User Identification with Digital Signature Message Verification

You can identify the sender by creating a Unique ID as well as a Name attached to the message payload of the chat conversation. This is similar to IRC strategies but a bit more simplistic.

var user_id      = PUBNUB.uuid();
var user_name    = name.value;
var user_message = input.vaule;
@LunaCodeGirl
LunaCodeGirl / examples.sh
Created September 25, 2013 23:39
Figlet how to and examples
figlet "I've got something to say"
figlet -f thick "Make Tech ASCIIer"
date | figlet -f basic