sudo nix-channel --add https://nixos.org/channels/nixos-unstable nixos- Discord
- Gitkraken
- SSH Keys
- Firefox
- BitWarden
- Grammarly
- Tab Session Manager
- RabattCorner
- qBittorrent
- Resilio Sync
- RustDesk
- Signal
- Spotify
- Steam
gpg --output private.gpg --armor --export-secret-key ryan.horiguchi@gmail.comgpg --import private.gpg
expect << 'EOF'
spawn gpg --edit-key ryan.horiguchi@gmail.com
expect "gpg>"
send "trust\n"
expect "Your decision?"
send "5\n"
expect "Do you really want to set this key to ultimate trust?"
send "y\n"
expect "gpg>"
send "quit\n"
interact
EOFnix-shell -p libsecret --run 'secret-tool store --label=KeePass KeePass 2FA'Advanced mode(F7)->Advanced->AMD CBS->ECC->EnabledAdvanced mode(F7)->Advanced->APM Configuration->Restore AC Power Loss->Last StateAdvanced mode(F7)->Boot->Boot Configuration->Wait For [F1] If Error->DisabledAdvanced mode(F7)->BootSecure Boot->OS Type->Other OSAdvanced mode(F7)->BootSecure Boot->Secure Boot Mode->CustomAdvanced mode(F7)->Tool->ASUS Armoury Crate->Download & Install ARMOURY CRATE app->DisabledAURA(F4)->Aura OffReSizable BAR->ON
Set any username and password. Will be removed after restart of service.
zpool create -f \
-o ashift=12 \
-o autotrim=on \
-O compression=off \
-O mountpoint=legacy \
os \
mirror \
nvme-WD_BLACK_SN850X_2000GB_24271Z801901_1-part2 \
nvme-WD_BLACK_SN850X_2000GB_25256R803288_1-part2
zfs create \
os/root
zpool create -f \
-o ashift=12 \
-o autotrim=on \
-O compression=off \
-O mountpoint=legacy \
data \
raidz \
ata-Samsung_SSD_870_EVO_2TB_S6PPNM0TB02114B \
ata-Samsung_SSD_870_EVO_2TB_S6PPNM0TB02182K \
ata-Samsung_SSD_870_EVO_2TB_S6PPNM0TB06008F \
ata-Samsung_SSD_870_EVO_2TB_S6PPNM0TB06013H
zfs create \
-o compression=lz4 \
data/backup
zfs create \
data/deluge
zfs create \
data/monitoring
zfs create \
data/movies
zfs create \
data/series
zfs create \
-o quota=512G \
data/syncnix --experimental-features "nix-command flakes" run github:nix-community/disko -- --mode destroy,format,mount ./disko/XXLPitu-Aizen.nixcryptsetup luksFormat --type luks2 /dev/sdX
dd if=/dev/random bs=256 count=1 of=/PATH_TO_KEY_FILE
cryptsetup luksAddKey /dev/sdX /PATH_TO_KEY_FILE
cryptsetup luksOpen --key-file /PATH_TO_KEY_FILE /dev/disk/by-uuid/792d67dc-3de4-4790-9e51-ec281e28b0d1 backup
mkfs.ext4 -L backup /dev/mapper/backupfwupdmgr get-devicesfwupdmgr refresh
fwupdmgr get-updates
fwupdmgr updatemkdir -p /mnt/FIRMWARE && mount /dev/disk/by-label/FIRMWARE /mnt/FIRMWARE
BOOTFS=/mnt/FIRMWARE FIRMWARE_RELEASE_STATUS=stable rpi-eeprom-update -d -a
umount /mnt/FIRMWARE && rm -rf /mnt/FIRMWARE