This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
server { | |
listen 8080; | |
server_name local.webblob.com; | |
root /Users/cbednarski/code/WebBlob/src; | |
error_page 403 /403.html; | |
error_page 404 /404.html; | |
error_page 500 /500.html; | |
error_page 502 /502.html; | |
error_page 503 /503.html; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
server { | |
listen 8080; | |
server_name local.webblob.com; | |
root /Users/cbednarski/code/WebBlob/src; | |
error_page 403 /403.html; | |
error_page 404 /404.html; | |
error_page 500 /500.html; | |
error_page 502 /502.html; | |
error_page 503 /503.html; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[plex-server] | |
title=plex | |
description=Plex-Server | |
ports=3005,8324,32469,32400/tcp|1900,5353,32410,32412,32413,32414/udp |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
########## | |
# Win10 Post Setup Script | |
# Original Author: Disassembler <[email protected]> | |
# Edited by Sven212 | |
# Version: 1.5, 2016-06-08 | |
########## | |
# Ask for elevated permissions if required | |
If (!([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]"Administrator")) { | |
Start-Process powershell.exe "-NoProfile -ExecutionPolicy Bypass -File `"$PSCommandPath`"" -Verb RunAs |