start new:
tmux
start new with session name:
tmux new -s myname
| public class Ref { | |
| public void inc1(int i) { | |
| ++i; | |
| } | |
| public void inc2(Integer i) { | |
| ++i; | |
| } | |
| public static void main(String[] args) { | |
| int foo = 32; | |
| Integer bar = 41; |
| # To decode: | |
| # qp -d string | |
| # To encode: | |
| # qp string | |
| alias qpd='perl -MMIME::QuotedPrint -pe '\''$_=MIME::QuotedPrint::decode($_);'\''' | |
| alias qpe='perl -MMIME::QuotedPrint -pe '\''$_=MIME::QuotedPrint::encode($_);'\''' | |
| function qp { | |
| if [[ "$1" = "-d" ]] | |
| then |
| /* | |
| For some reason, the change() event only fires when the input field loses focus. | |
| Binding to other options ('change keypress paste focus textInput input') will | |
| fire the event several times, which is bad. The below code works even when | |
| content is pasted into the text field, and only fires once as expected. | |
| */ | |
| $('#search-form .term').bind('input', function(){ | |
| console.log('this actually works'); | |
| }); |
| <!-- | |
| 1. Download the Android Jelly Bean fonts and the Symbola font: | |
| https://www.dropbox.com/s/tvtzcnzkvbe0nrt/jelly-bean-fonts.zip | |
| http://users.teilar.gr/~g1951d/Symbola707.zip | |
| 2. unzip the files and put AndroidEmoji.ttf and Symbola.ttf (and any of the other fonts that strike your fancy) | |
| in your ~/.fonts/ directory | |
| 3. run `fc-cache -f`. You can check to make sure the new fonts | |
| were installed with `fc-list`. You'll probably want to grep the copious output for Symbola or Emoji |
| apt-get install python-pygraphviz | |
| pip install django-extensions | |
| # add 'django_extensions' to INSTALLED_APPS in settings.py | |
| python manage.py graph_models trees -o test.png |
| from django import forms | |
| from django.forms.fields import MultiValueField | |
| import pytz | |
| # provided by django-timezone-field==0.4 | |
| from timezone_field import TimeZoneFormField | |
| class DatetimeTZWidget(forms.MultiWidget): |
| #!/usr/bin/env python2 | |
| """ | |
| Author: takeshix <[email protected]> | |
| PoC code for CVE-2014-0160. Original PoC by Jared Stafford ([email protected]). | |
| Supportes all versions of TLS and has STARTTLS support for SMTP,POP3,IMAP,FTP and XMPP. | |
| """ | |
| import sys,struct,socket | |
| from argparse import ArgumentParser |
| I wasn't first to get the key. Nor was I second, third, or even fourth. I'm probably not even the | |
| 10th to get it (ok, looks like I was the 8th.) But I'm happy that I was able to prove to myself | |
| that I too could do it. | |
| First, I have to admit I was a skeptic. Like the handful of other dissenters, I had initially | |
| believed that it would be highly improbable under normal conditions to obtain the private key | |
| through exploiting Heartbleed. So this was my motivation for participating in Cloudflare's | |
| challenge. I had extracted a lot of other things with Heartbleed, but I hadn't actually set out to | |
| extract private keys. So I wanted to see first-hand if it was possible or not. |
| # Obtain the label of a given class (:class1). | |
| SELECT DISTINCT ?c (STR(?l) AS ?lb) | |
| WHERE { | |
| ?c a :class1 ; | |
| <http://www.w3.org/2000/01/rdf-schema#label> ?l . | |
| } | |
| # Obtain a list of classes. | |
| SELECT DISTINCT ?c | |
| WHERE { |