I hereby claim:
- I am elidickinson on github.
- I am esd (https://keybase.io/esd) on keybase.
- I have a public key whose fingerprint is 6884 A79C 69EC C924 961C 95B9 2CEB 89F6 30BC 7837
To claim this, I am signing this object:
| { | |
| "cmd": ["curl","-s","-S","--write-out", "Response code: %{http_code}; Total time: %{time_total}\n","-o","$file_base_name.min.js","--data-urlencode","js_code@$file","http://marijnhaverbeke.nl/uglifyjs"], | |
| "selector": "source.js" | |
| } |
| import tweepy | |
| import tempfile | |
| import urllib | |
| from time import sleep | |
| import os | |
| url = 'http://wwc.instacam.com/instacamimg/KDCA/KDCA_l.jpg' | |
| # The consumer keys can be found on your application's Details | |
| # page located at https://dev.twitter.com/apps (under "OAuth settings") |
| // ==UserScript== | |
| // @name UTM param stripper | |
| // @author Paul Irish | |
| // @namespace http://github.com/paulirish | |
| // @version 1.1 | |
| // @description Drop the UTM params from a URL when the page loads. | |
| // @extra Cuz you know they're all ugly n shit. | |
| // @include http://* | |
| // ==/UserScript== |
| // utmstrip.js strips utm_* strings from the URL bar of your site, but afer Google Analytics | |
| // has had a chance to grab them. Based on Paul Irish's utm-stripping user script. | |
| // | |
| // Source: https://gist.github.com/elidickinson/9128677 | |
| // | |
| // Install Notes: | |
| // - This script should run *after* you have added all your "_trackPageview" or "_trackEvent" | |
| // calls to the _gaq variable. | |
| // - It doesn't matter of Google Analtyics has actually finished loading yet, but if you | |
| // you tell it to strip the utm_* strings before _trackPageview sees them, it won't know |
| --- MySQL-python-1.2.3/setup_posix.py 2010-06-17 09:21:56.000000000 +0200 | |
| +++ MySQL-python-1.2.3-patched/setup_posix.py 2013-11-12 13:05:44.028407794 +0100 | |
| @@ -85,6 +85,7 @@ | |
| ] | |
| create_release_file(metadata) | |
| del metadata['version_info'] | |
| + libraries.append('stdc++') | |
| ext_options = dict( | |
| name = "_mysql", | |
| library_dirs = library_dirs, |
| { | |
| "cmd": ["sass", "--update", "$file:${file_path}/${file_base_name}.css", "--no-cache", "--style", "compact"], | |
| "selector": "source.sass, source.scss", | |
| "file_regex": "error (/.*.scss) .Line ([0-9]+):", | |
| "osx": { | |
| "path": "/usr/local/var/rbenv/shims/:/usr/local/bin:$PATH" | |
| }, | |
| "windows": { | |
| "shell": "true" | |
| } |
| To check if the system is vulnerable: | |
| env x='() { :;}; echo vulnerable' bash -c /bin/bash | |
| returns 'vulnerable' |
| import dns.resolver | |
| import csv | |
| import re | |
| import sys | |
| domain_cache = {} | |
| def test_email_domain(domain): | |
| if domain is None: | |
| return False |
I hereby claim:
To claim this, I am signing this object: