This gist shows how to create a GIF screencast using only free OS X tools: QuickTime, ffmpeg, and gifsicle.
To capture the video (filesize: 19MB), using the free "QuickTime Player" application:
// Original code from http://www.blog.highub.com/mobile-2/a-fix-for-iphone-viewport-scale-bug/ | |
var metas = document.getElementsByTagName('meta'); | |
var i; | |
if (navigator.userAgent.match(/iPhone/i)) { | |
for (i=0; i<metas.length; i++) { | |
if (metas[i].name == "viewport") { | |
metas[i].content = "width=device-width, minimum-scale=1.0, maximum-scale=1.0"; | |
} | |
} |
/* | |
Chrome Developer Tools - Monokai Color Theme | |
Author: Béres Máté Csaba / bjmatt.com / @bjmatt / [email protected] | |
----------------------------------------------------------------------------------------------------------- | |
Installation: | |
1. Find your Chrome's user stylesheets directory: |
define(function () { | |
'use strict'; | |
/*! | |
* quantize.js Copyright 2008 Nick Rabinowitz. | |
* Licensed under the MIT license: http://www.opensource.org/licenses/mit-license.php | |
*/ | |
// fill out a couple protovis dependencies | |
/*! |
var net = require("net"), | |
args = {}; | |
process.argv.forEach(function (val, index) { | |
var dest, listen; | |
if (val === '--destination') { | |
dest = process.argv[index + 1].split(':'); | |
args.destination = dest[0]; |
#!/usr/bin/env sh | |
# Download lists, unpack and filter, write to stdout | |
curl -s http://www.iblocklist.com/lists.php \ | |
| sed -n "s/.*value='\(http:.*=bt_.*\)'.*/\1/p" \ | |
| xargs wget -O - \ | |
| gunzip \ | |
| egrep -v '^#' |
#!/bin/bash | |
set -e | |
usage(){ | |
echo "Error $errcode $errorcode at line ${BASH_LINENO[0]} while executing: $BASH_COMMAND" | |
exit $errorcode | |
} | |
trap usage ERR |
Following this gist, I decided to create my own tutorial/manual for future reference.
Before trying to convert anything, you must have the following tools installed:
The attack detailed below has stopped (for the time being) and almost all network access for almost all customers have been restored. We're keeping this post and the timeline intact for posterity. Unless the attack resumes, we'll post a complete postmortem within 48 hours (so before Wednesday, March 26 at 11:00am central time).
Criminals have laid siege to our networks using what's called a distributed denial-of-service attack (DDoS) starting at 8:46 central time, March 24 2014. The goal is to make Basecamp, and the rest of our services, unavailable by flooding the network with bogus requests, so nothing legitimate can come through. This attack was launched together with a blackmail attempt that sought to have us pay to avoid this assault.
Note that this attack targets the network link between our servers and the internet. All the data is safe and sound, but nobody is able to get to it as long as the attack is being successfully executed. This is like a bunch of people