I hereby claim:
- I am ccoenen on github.
- I am amenthes (https://keybase.io/amenthes) on keybase.
- I have a public key whose fingerprint is AC0E EF09 8692 337D C2DF 08AC 1643 AC59 BD9B 1572
To claim this, I am signing this object:
// # The Exploit comes as an event-invitation, it wants you to klick this link | |
// http://www.goo gle.com/url?sa=t&source=web&cd=1&ved=0CBoQFjAA&url=http%3A%2F%2Fwho-spying-u.blogspot.com%2F&ei=SHO2TaA kiNiIAve95Sk&usg=AFQjCNH_JxkE7o8CvUwsLVUwr2eGGP4ecw&sig2=Ye1vqVHrMDHWkRv--npMkw%3 Fqw020fbs (remove spaces if interested) | |
// # The link is a redirect to ht tp: //ge rman -spy3 .bl ogsp ot.c om/ (remove spaces if interested) | |
// # you are directed to copy and paste a snipped of JS Code into your address-bar, see loader.js below. | |
// # This script was taken from iamedwards.com on 2011-04-26 | |
// this file can be downloaded by using curl with a refer and user-agent like this: | |
// curl -i -e "http://www.facebook.com" -A "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0" http://iamedwards.com/german.php?0.214 | |
// # ran it through a beautifier | |
// # ran it through a for-loop to de-obfuscate the texts like this: for (var t in _0x8a40) { document.write('"'+_0x8a40[t] + '", '); } | |
// # started comment |
<?xml version="1.0"?> | |
<settings> | |
<!-- | |
Bonus-Tip: set init_dir to the default location, where all your shells should open (can be overriden on a per-shell basis) | |
--> | |
<console change_refresh="10" refresh="100" rows="30" columns="110" buffer_rows="2000" buffer_columns="0" shell="" init_dir="MY PROJECT DIRECTORY" start_hidden="0" save_size="0"> | |
<colors> | |
<color id="0" r="0" g="0" b="0"/> | |
<color id="1" r="0" g="0" b="128"/> | |
<color id="2" r="0" g="150" b="0"/> |
require 'yajl' | |
require 'yajl/json_gem' | |
@hostlist = {} | |
def object_parsed(obj) | |
puts Yajl::Encoder.encode(obj) | |
obj.each do |item| | |
if item['request'] == 'sender data' |
#!/usr/bin/env python | |
import http.server | |
class MyHTTPRequestHandler(http.server.SimpleHTTPRequestHandler): | |
def end_headers(self): | |
self.send_my_headers() | |
http.server.SimpleHTTPRequestHandler.end_headers(self) | |
def send_my_headers(self): | |
self.send_header("Cache-Control", "no-cache, no-store, must-revalidate") |
[user] | |
name = My Awesome name | |
[core] | |
excludesfile = c:/Users/....../.gitignore_global | |
editor = 'C:/Program Files (x86)/Notepad++/notepad++.exe' -multiInst -nosession -noPlugin | |
autocrlf = false | |
[push] | |
default = simple |
#!/bin/bash | |
# | |
# MINOR CHANGES IN THIS VERSION, NOT ACTUALLY THE ORIGINAL RELEASE! | |
# | |
# upnp2mrtg - Monitoring AVM Fritz!Box With MRTG | |
# This versions have been reported as working: 3030, 5050, 7050, 7141 and 7170 | |
# | |
# Copyright (C) 2005 Michael Tomschitz <[email protected]> | |
# | |
# This program is free software; you can redistribute it and/or modify |
I hereby claim:
To claim this, I am signing this object:
The Monty Hall Problem is a probability puzzle.
When i read [this article about Marilyn vos Savant][1], my initial reaction was "that can't be right". I continued to read the comments, the [wikipedia page][2] and then started a table to see if this was indeed the case. Being a programmer, i then started a simulation.
This is what it turned out to be.
The concise explanation is: The door's chance does not change. This
PREFIX=any.prefix.will.do | |
STATSD_HOSTNAME=your.server.name | |
STATSD_PORT=8125 | |
while true; do | |
echo "$PREFIX.systemload1:`cut -f1 -d " " /proc/loadavg`|g" | ./nc -u -q 0 $STATSD_HOSTNAME $STATSD_PORT | |
cat /proc/stat | grep "cpu " | \ | |
while read -r cpu user nice system idle iowait irq softirq steal guest guestnice | |
do |
#!/usr/bin/env ruby | |
# moves files containing 002 on line 9 to a different directory. | |
require 'fileutils' | |
FileUtils.mkdir_p('with002') | |
FileUtils.mkdir_p('no002') | |
def contains_zero_zero_two?(filename) |