I hereby claim:
- I am ajinabraham on github.
- I am ajinabraham (https://keybase.io/ajinabraham) on keybase.
- I have a public key whose fingerprint is 2E56 D8BC 3FBB EF1E 3641 1700 D6D7 1209 1CA3 D45A
To claim this, I am signing this object:
/** | |
* A Javascript object to encode and/or decode html characters using HTML or Numeric entities that handles double or partial encoding | |
* Author: R Reid | |
* source: http://www.strictly-software.com/htmlencode | |
* Licences: GPL, The MIT License (MIT) | |
* Copyright: (c) 2011 Robert Reid - Strictly-Software.com | |
* | |
* Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: | |
* The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. | |
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABI |
Private Sub ProcessRequests() | |
If Not System.Net.HttpListener.IsSupported Then | |
Exit Sub | |
End If | |
Dim listener As System.Net.HttpListener = _ | |
New System.Net.HttpListener() | |
listener.Prefixes.Add("http://*:8998/") | |
listener.Start() |
function require(file,callback){ | |
var head=document.getElementsByTagName("head")[0]; | |
var script=document.createElement('script'); | |
script.src=file; | |
script.type='text/javascript'; | |
//real browsers | |
script.onload=callback; | |
//Internet explorer | |
script.onreadystatechange = function() { |
import re, urllib | |
PAT = re.compile(ur'(?i)\b((?:https?://|www\d{0,3}[.]|[a-z0-9.\-]+[.][a-z]{2,4}/)(?:[^\s()<>]+|\(([^\s()<>]+|(\([^\s()<>]+\)))*\))+(?:\(([^\s()<>]+|(\([^\s()<>]+\)))*\)|[^\s`!()\[\]{};:\'".,<>?\xab\xbb\u201c\u201d\u2018\u2019]))') | |
for line in urllib.urlopen("http://daringfireball.net/misc/2010/07/url-matching-regex-test-data.text"): | |
print [ mgroups[0] for mgroups in PAT.findall(line) ] | |
; a hand-made GIF containing valid JavaScript code | |
; abusing header to start a JavaScript comment | |
; inspired by Saumil Shah's Deadly Pixels presentation | |
; Ange Albertini, BSD Licence 2013 | |
; yamal gifjs.asm -o img.gif | |
WIDTH equ 10799 ; equivalent to 2f2a, which is '/*' in ASCII, thus starting an opening comment |
I hereby claim:
To claim this, I am signing this object:
import android.content.Context; | |
import android.content.pm.PackageInfo; | |
import android.content.pm.PackageManager; | |
import android.content.pm.PackageManager.NameNotFoundException; | |
import android.content.pm.Signature; | |
public class TamperCheck { | |
//we store the hash of the signture for a little more protection | |
private static final String APP_SIGNATURE = "1038C0E34658923C4192E61B16846"; |
import SimpleHTTPServer | |
class CORSHTTPRequestHandler(SimpleHTTPServer.SimpleHTTPRequestHandler): | |
def send_head(self): | |
"""Common code for GET and HEAD commands. | |
This sends the response code and MIME headers. | |
Return value is either a file object (which has to be copied | |
to the outputfile by the caller unless the command was HEAD, | |
and must be closed by the caller under all circumstances), or |
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 | |
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 | |
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 | |
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA | |
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA | |
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 | |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | |
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 | |
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |