I hereby claim:
- I am brianhempel on github.
- I am brianhempel (https://keybase.io/brianhempel) on keybase.
- I have a public key whose fingerprint is 599A 31A4 A090 2699 AA81 9770 110B F56B 2900 4272
To claim this, I am signing this object:
| #!/usr/bin/env ruby | |
| HELP_STR = "Usage: $ remove_rightslink_images file1.pdf file2.pdf" | |
| begin | |
| require 'hexapdf' # HexaPDF is AGPL licensed according to https://hexapdf.gettalong.org/ | |
| rescue LoadError | |
| if system("gem install --no-doc hexapdf") | |
| Gem.clear_paths | |
| require "hexapdf" |
I hereby claim:
To claim this, I am signing this object:
| # Probably want to spoof all your headers to be just like a normal web browser | |
| # so an attacker can't guess that you're trying to rat them out, but here's a | |
| # start. | |
| USER_AGENT="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.130 Safari/537.36" | |
| curl -A "$USER_AGENT" -sS https://sneakynote.com/send > send_live | |
| curl -A "$USER_AGENT" -sS https://sneakynote.com/get > get_live | |
| curl -A "$USER_AGENT" -sS https://raw.githubusercontent.com/brianhempel/sneakynote.com/master/public/send > send_github | |
| curl -A "$USER_AGENT" -sS https://raw.githubusercontent.com/brianhempel/sneakynote.com/master/public/get > get_github |
| require "net/http" | |
| def start_server | |
| # Remove the X to enable the parameters for tuning. | |
| # These are the default values as of Ruby 2.2.0. | |
| @child = spawn(<<-EOC.split.join(" ")) | |
| XRUBY_GC_HEAP_FREE_SLOTS=4096 | |
| XRUBY_GC_HEAP_INIT_SLOTS=10000 | |
| XRUBY_GC_HEAP_GROWTH_FACTOR=1.8 | |
| XRUBY_GC_HEAP_GROWTH_MAX_SLOTS=0 |
| # Natively, Enumerators get JSONized like "#<Enumerator::Lazy:0x007f8714807080>", or they explode, either of which is a problem. | |
| # We want them to make an array, and do it lazily so we don't have to keep the items in memory! | |
| class Enumerator | |
| def to_json(state) | |
| state.depth += 1 | |
| string = "[\n" | |
| first_item = true | |
| self.each do |item| |
| benchmark/bm_app_pentomino.rb | |
| bootstraptest/runner.rb | |
| enc/make_encmake.rb | |
| enc/unicode/case-folding.rb | |
| ext/extmk.rb | |
| ext/socket/extconf.rb | |
| ext/tk/sample/tkbiff.rb | |
| lib/mkmf.rb | |
| lib/rdoc/constant.rb | |
| lib/rdoc/markup/pre_process.rb |
| 15621016 :@ident | |
| 6122824 :var_ref | |
| 5547844 :args_add_block | |
| 4507766 :@tstring_content | |
| 4490030 :"." | |
| 4125221 :string_content | |
| 4125221 :string_literal | |
| 3757094 :call | |
| 2890433 :method_add_arg | |
| 2696463 :arg_paren |
| require "json" | |
| api_key = "your api key here" | |
| regexp = /Project X/ | |
| snitches = JSON.parse(`curl -u #{api_key}: https://api.deadmanssnitch.com/v1/snitches`) | |
| snitches.each do |snitch| | |
| if snitch["name"] =~ regexp | |
| puts "Deleting #{snitch["token"]} #{snitch["name"]}..." |
| # Activate the gem you are reporting the issue against. | |
| gem 'activerecord', '4.1.1' | |
| require 'sqlite3' | |
| require 'active_record' | |
| require 'minitest/autorun' | |
| require 'logger' | |
| # Ensure backward compatibility with Minitest 4 | |
| Minitest::Test = MiniTest::Unit::TestCase unless defined?(Minitest::Test) |
DEFLATE BREACH is a proposed DEFLATE compressor designed to mitigate BREACH attacks with only a moderate loss in compression ratio.