I hereby claim:
- I am dividedmind on github.
- I am divide (https://keybase.io/divide) on keybase.
- I have a public key whose fingerprint is FB5E B7FF D5FE A129 6205 CE99 0EC0 BE49 5081 0AEC
To claim this, I am signing this object:
// Google+ default stream | |
// version 0.1 | |
// 2011-07-02 | |
// Public domain | |
// | |
// ==UserScript== | |
// @name Google+ default stream | |
// @description sets default stream on Google+ | |
// @match https://*.google.com/* | |
// ==/UserScript== |
#!/usr/bin/python | |
# -*- coding: utf-8 -*- | |
# Quick and dirty Chrome kwallet password extractor | |
from PyKDE4.kdeui import KWallet | |
from PyQt4.QtGui import QApplication | |
from sys import argv | |
app = QApplication([]) |
Mar 5 16:07:57 daktylon modem-manager[1003]: <debug> [mm-at-serial-port.c:334] debug_log(): (ttyACM1): --> 'AT+CSQ<CR>' | |
Mar 5 16:07:57 daktylon modem-manager[1003]: <debug> [mm-at-serial-port.c:334] debug_log(): (ttyACM1): <-- '<CR><LF>+CSQ: 4,0<CR><LF><CR><LF>OK<CR><LF>' | |
Mar 5 16:07:57 daktylon modem-manager[1003]: <debug> [mm-at-serial-port.c:334] debug_log(): (ttyACM1): --> 'AT%NWSTATE=1<CR>' | |
Mar 5 16:07:57 daktylon modem-manager[1003]: <debug> [mm-at-serial-port.c:334] debug_log(): (ttyACM1): <-- '<CR><LF>%NWSTATE: 2,26002,3G,HSDPA-HSUPA-HSPA+,0<CR><LF><CR><LF>OK<CR><LF | |
>' | |
Mar 5 16:07:57 daktylon modem-manager[1003]: <debug> [mm-at-serial-port.c:334] debug_log(): (ttyACM1): <-- '<CR><LF>%NWSTATE: 2,26002,3G,HSDPA-HSUPA-HSPA+,0<CR><LF>' | |
Mar 5 16:07:58 daktylon modem-manager[1003]: <debug> [mm-at-serial-port.c:334] debug_log(): (ttyACM1): <-- '<CR><LF>%NWSTATE: 1,26002,3G,HSDPA-HSUPA-HSPA+,0<CR><LF>' | |
Mar 5 16:08:03 daktylon modem-manager[1003]: <debug> [mm-at-serial-port.c:334] debug_log(): (ttyACM1) |
source 'https://rubygems.org' | |
gem 'rails-api', '>= 0' | |
gem 'slosilo', '>= 0' | |
gem 'slosilo', '>= 0' | |
gem 'rails-api', '>= 0' | |
gem 'pg_random_id', '>= 0' | |
gem 'sequel-attribute_callbacks', '>= 0' | |
gem 'json_spec', '>= 0' | |
gem 'talentbox-sequel-rails', '>= 0' |
#!/usr/bin/env ruby | |
# I opted for a more conventional mapping, as in | |
# https://en.wikipedia.org/wiki/File:Telephone-keypad2.svg | |
MAP = { | |
'2' => 'abc', | |
'3' => 'def', | |
'4' => 'ghi', | |
'5' => 'jkl', | |
'6' => 'mno', |
#!/usr/bin/env ruby | |
# solution of http://uva.onlinejudge.org/external/13/1339.pdf | |
ARGF.map {|x| x.strip.chars.group_by(&:to_s).values.map(&:length).sort }. | |
each_slice(2) {|a, b| puts a == b ? 'YES' : 'NO' } |
sigi = sigma.instances[1]; | |
var prefix = /.{7}/; | |
sigi.iterNodes(function (node) { | |
node.label = node.attr.kind + ": " + node.attr.name.replace(prefix, ''); | |
}); | |
WebFontConfig = { | |
google: { families: [ 'Lato::latin' ] } |
195 <13>1 2013-12-28T03:15:18.713037+00:00 app web.1 - - [authz-ci-conjur] [836de4aadf34a61d9f8f1c550227d0a7] Processing by RolesController#list_members as XML | |
227 <13>1 2013-12-28T03:15:18.715912+00:00 app web.1 - - [authz-ci-conjur] [836de4aadf34a61d9f8f1c550227d0a7] Parameters: {"members"=>nil, "account"=>"ci", "role"=>"layer/205cm0/ldap-test"} | |
202 <13>1 2013-12-28T03:15:18.720253+00:00 app web.1 - - [authz-ci-conjur] [836de4aadf34a61d9f8f1c550227d0a7] [1m[35mSequel::Postgres::Database (3.9ms)[0m BEGIN | |
296 <13>1 2013-12-28T03:15:18.725630+00:00 app web.1 - - [authz-ci-conjur] [836de4aadf34a61d9f8f1c550227d0a7] [1m[36mSequel::Postgres::Database (3.7ms)[0m [1mSELECT * FROM "roles" WHERE ("id" = ROW('ci', 'layer:205cm0/ldap-test')::"role_id") LIMIT 1[0m | |
279 <13>1 2013-12-28T03:15:18.738816+00:00 app web.1 - - [authz-ci-conjur] [836de4aadf34a61d9f8f1c550227d0a7] [1m[35mSequel::Postgres::Database (12.0ms)[0m SELECT * FROM "roles" WHERE ("id" = ROW('ci', 'user:kgilpin')::"role_id") LIMIT 1 |
I hereby claim:
To claim this, I am signing this object:
#!/bin/bash -e | |
# | |
# Conjur servers older than v4.4.1 might be susceptible to Logjam attack | |
# (see weakdh.org for details). While the feasibility of such an attack is | |
# partly mitigated by network architectures Conjur is typically deployed into, | |
# the following script allows patching older appliances without upgrading to | |
# the new version. | |
# | |
# To apply the hotfix use `logjam-fix.sh apply`: | |
# $ wget https://gist.githubusercontent.com/dividedmind/aa32c62508ceefb8186e/raw/logjam-fix.sh |