I hereby claim:
- I am elidickinson on github.
- I am esd (https://keybase.io/esd) on keybase.
- I have a public key whose fingerprint is 6884 A79C 69EC C924 961C 95B9 2CEB 89F6 30BC 7837
To claim this, I am signing this object:
| # What 8 letter word can have a letter taken away, and each time still make another word, until only one letter (and one word) are left? | |
| words_by_length = [set(), set(), set(), set(), set(), set(), set(), set(), set()] | |
| with open('scrabble2019.txt') as f: | |
| for w in f: | |
| word = w.strip() | |
| word_len = len(word) | |
| if word_len <= 8: | |
| words_by_length[word_len].add(word) | |
| answers = set() |
| var x = $(".gb-domain-name").each(function(i,x) { console.log($(x,"span").text())}); window.scrollBy(0,600) |
I hereby claim:
To claim this, I am signing this object:
| import dns.resolver | |
| import csv | |
| import re | |
| import sys | |
| domain_cache = {} | |
| def test_email_domain(domain): | |
| if domain is None: | |
| return False |
| To check if the system is vulnerable: | |
| env x='() { :;}; echo vulnerable' bash -c /bin/bash | |
| returns 'vulnerable' |
| { | |
| "cmd": ["sass", "--update", "$file:${file_path}/${file_base_name}.css", "--no-cache", "--style", "compact"], | |
| "selector": "source.sass, source.scss", | |
| "file_regex": "error (/.*.scss) .Line ([0-9]+):", | |
| "osx": { | |
| "path": "/usr/local/var/rbenv/shims/:/usr/local/bin:$PATH" | |
| }, | |
| "windows": { | |
| "shell": "true" | |
| } |
| --- MySQL-python-1.2.3/setup_posix.py 2010-06-17 09:21:56.000000000 +0200 | |
| +++ MySQL-python-1.2.3-patched/setup_posix.py 2013-11-12 13:05:44.028407794 +0100 | |
| @@ -85,6 +85,7 @@ | |
| ] | |
| create_release_file(metadata) | |
| del metadata['version_info'] | |
| + libraries.append('stdc++') | |
| ext_options = dict( | |
| name = "_mysql", | |
| library_dirs = library_dirs, |
| // utmstrip.js strips utm_* strings from the URL bar of your site, but afer Google Analytics | |
| // has had a chance to grab them. Based on Paul Irish's utm-stripping user script. | |
| // | |
| // Source: https://gist.github.com/elidickinson/9128677 | |
| // | |
| // Install Notes: | |
| // - This script should run *after* you have added all your "_trackPageview" or "_trackEvent" | |
| // calls to the _gaq variable. | |
| // - It doesn't matter of Google Analtyics has actually finished loading yet, but if you | |
| // you tell it to strip the utm_* strings before _trackPageview sees them, it won't know |
| // ==UserScript== | |
| // @name UTM param stripper | |
| // @author Paul Irish | |
| // @namespace http://github.com/paulirish | |
| // @version 1.1 | |
| // @description Drop the UTM params from a URL when the page loads. | |
| // @extra Cuz you know they're all ugly n shit. | |
| // @include http://* | |
| // ==/UserScript== |