Compare commits
6 commits
550493cfe1
...
4b499d5fc7
Author | SHA1 | Date | |
---|---|---|---|
4b499d5fc7 | |||
d59dd43586 | |||
bebb238655 | |||
e564898be6 | |||
f4572a1dd7 | |||
f47f7b67c5 |
4 changed files with 50 additions and 7 deletions
1
.gitignore
vendored
1
.gitignore
vendored
|
@ -1,2 +1,3 @@
|
||||||
.venv
|
.venv
|
||||||
src/.env
|
src/.env
|
||||||
|
.env
|
||||||
|
|
15
src/cse-webhook-watcher.service
Normal file
15
src/cse-webhook-watcher.service
Normal file
|
@ -0,0 +1,15 @@
|
||||||
|
[Unit]
|
||||||
|
Description=Webhook watcher for the Cybersecutiry entschluesselt podcast
|
||||||
|
After=syslog.target
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=simple
|
||||||
|
User=cse-webhook
|
||||||
|
Group=cse-webhook
|
||||||
|
WorkingDirectory=/srv/cse-webhook-watcher
|
||||||
|
ExecStart=/srv/cse-webhook-watcher/.venv/bin/python3 -u /srv/cse-webhook-watcher/src/main.py
|
||||||
|
StandardOutput=journal
|
||||||
|
StandardError=journal
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
|
@ -8,7 +8,7 @@ import re
|
||||||
from bs4 import BeautifulSoup
|
from bs4 import BeautifulSoup
|
||||||
import dotenv
|
import dotenv
|
||||||
|
|
||||||
CONFIG = dotenv.dotenv_values(".env")
|
CONFIG = dotenv.dotenv_values("/srv/cse-webhook-watcher/.env")
|
||||||
|
|
||||||
|
|
||||||
def read_known() -> list:
|
def read_known() -> list:
|
||||||
|
@ -29,9 +29,9 @@ def read_known() -> list:
|
||||||
return known
|
return known
|
||||||
|
|
||||||
def daemon():
|
def daemon():
|
||||||
|
|
||||||
try:
|
|
||||||
while True:
|
while True:
|
||||||
|
# keep trying, i know you will make it one day
|
||||||
|
try:
|
||||||
r = requests.get(CONFIG['URL'])
|
r = requests.get(CONFIG['URL'])
|
||||||
soup = BeautifulSoup(r.content, features='xml')
|
soup = BeautifulSoup(r.content, features='xml')
|
||||||
articles = soup.findAll('item')
|
articles = soup.findAll('item')
|
||||||
|
|
27
storage.txt
27
storage.txt
|
@ -0,0 +1,27 @@
|
||||||
|
Introfolge
|
||||||
|
Verschlüsselung
|
||||||
|
Passwörter
|
||||||
|
Sicherheit in der Softwareentwicklung
|
||||||
|
Kopierschutzmaßnahmen
|
||||||
|
Die Cybersicherheitsagenda
|
||||||
|
VPNs
|
||||||
|
Viren, Würmer und Trojaner
|
||||||
|
Authentisierung
|
||||||
|
Quantenkryptografie
|
||||||
|
Digitale Zertifikate
|
||||||
|
Digitale Spuren
|
||||||
|
Scam
|
||||||
|
Große Zahlen
|
||||||
|
Zero Trust
|
||||||
|
BSI
|
||||||
|
ChatGPT
|
||||||
|
Hacker
|
||||||
|
Hardwaresicherheit
|
||||||
|
Verantwortung
|
||||||
|
Seitenkanalangriffe
|
||||||
|
Prozess- und Personenzertifizierung
|
||||||
|
Produktzertifizierung
|
||||||
|
Elliptische Kurven
|
||||||
|
Cyberversicherungen
|
||||||
|
Funkprotokolle
|
||||||
|
Betriebssysteme
|
Loading…
Add table
Reference in a new issue