Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000| // Feross Aboukhadijeh - Apr 12 2010 | |
| // | |
| // Script I hacked together to cheat on TypeRacer.com. You use it by waiting for the typing game | |
| // to start. Once it starts, open up Firebug, paste in this code, and run it. Now, just press | |
| // space to auto-type each word. I made the user push space, as opposed to advancing the words | |
| // automatically because I believe the site looks for a keypress event before evaluating the contents | |
| // of the input box. I could not figure out how to fake a user keypress event. Perhaps this is | |
| // disallowed for browser security reasons? | |
| // | |
| // Next todo: Site detects the unbelievable WPM and asks you to do a captcha test. |
| #from functools import lru_cache#python >=3.2 | |
| from functools32 import lru_cache#python 2.7 | |
| #from repoze.lru import lru_cache#python 2.7 | |
| #NOTE: you can use python -m trace --count fibonacci.py | |
| #to see how many times each instruction is called | |
| #@lru_cache(maxsize=500)#repoze.lru needs maxsize arg | |
| @lru_cache()#using functools32 | |
| def fibonacci(n): |
Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000See Also:
| Level | Score | Regex | Credit |
|---|
| // this is the background code... | |
| // listen for our browerAction to be clicked | |
| chrome.browserAction.onClicked.addListener(function (tab) { | |
| // for the current tab, inject the "inject.js" file & execute it | |
| chrome.tabs.executeScript(tab.ib, { | |
| file: 'inject.js' | |
| }); | |
| }); |
| #!/usr/bin/python | |
| # -*- coding: utf-8 -*- | |
| import subprocess | |
| __all__ = ["transform"] | |
| __version__ = '0.3' | |
| __author__ = 'Christoph Burgmer <[email protected]>' | |
| __url__ = 'http://github.com/cburgmer/upsidedown' |
| * { | |
| font-size: 12pt; | |
| font-family: monospace; | |
| font-weight: normal; | |
| font-style: normal; | |
| text-decoration: none; | |
| color: black; | |
| cursor: default; | |
| } |
| # Windows (receiver) side: | |
| .\ffplay.exe -nodisp -ac 2 -acodec pcm_u8 -ar 48000 -analyzeduration 0 -probesize 32 -f u8 -i udp://0.0.0.0:18181?listen=1 | |
| # Linux (transmitter) side: | |
| pactl load-module module-null-sink sink_name=remote | |
| ffmpeg -f pulse -i "remote.monitor" -ac 2 -acodec pcm_u8 -ar 48000 -f u8 "udp://RECEIVER:18181" | |
| pavucontrol # Change the default output to the Null sink or move single applications to this "output" device. |
| Summary of passwords by sperglord8008s, updated November 1. 2020. For login try "root", "default", "defaul" or "root" | |
| 00000000 | |
| 059AnkJ | |
| 4uvdzKqBkj.jg | |
| 7ujMko0admin | |
| 7ujMko0vizxv | |
| 123 | |
| 1111 | |
| 1234 |
| # Config that is very close to a i3 window manager's keybinding. | |
| set -s escape-time 0 | |
| setw -g aggressive-resize on | |
| # First remove *all* keybindings | |
| unbind-key -a | |
| # List keys | |
| bind-key ? list-keys |