(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.
| # update | |
| sudo yum -y update | |
| sudo yum -y upgrade | |
| # enable EPEL6 by changing enabled=0 -> enabled=1 | |
| sudo vim /etc/yum.repos.d/epel.repo | |
| # install htop | |
| sudo yum install htop |
| (function($){ | |
| var Responsifier = { | |
| grid: [900, 768, 660, 560, 460, 360], | |
| update: function() { | |
| $('html').add('.responsive').each(function(){ | |
| var $el = $(this); | |
| var w = $el.width(); | |
| _.each(Responsifier.grid, function(v){ | |
| if (w < v) | |
| $el.addClass("responsive-" + v); |
| I wasn't first to get the key. Nor was I second, third, or even fourth. I'm probably not even the | |
| 10th to get it (ok, looks like I was the 8th.) But I'm happy that I was able to prove to myself | |
| that I too could do it. | |
| First, I have to admit I was a skeptic. Like the handful of other dissenters, I had initially | |
| believed that it would be highly improbable under normal conditions to obtain the private key | |
| through exploiting Heartbleed. So this was my motivation for participating in Cloudflare's | |
| challenge. I had extracted a lot of other things with Heartbleed, but I hadn't actually set out to | |
| extract private keys. So I wanted to see first-hand if it was possible or not. |
(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.