- Baby, Please Don't Go (Big Joe Williams)
- She's Got Balls
- Little Lover
- Soul Stripper (Angus Young, Malcolm Young)
#!/bin/bash | |
usage() { | |
echo "Interactively show slides from a file" | |
echo | |
echo "Usage:" | |
echo "$0 FILE LINES" | |
echo | |
echo "FILE is the file containing the slides." | |
echo "In the file, each slide is indicated with a simple 'slide' by itself" |
'''A function to refresh a lock that can timeout, before it times out.''' | |
def refresh_lock(conn, lockname, identifier, lock_timeout=10): | |
pipe = conn.pipeline(True) | |
lockname = 'lock:' + lockname | |
while True: | |
try: | |
pipe.watch(lockname) | |
if pipe.get(lockname) == identifier: |
# See a video of this at: http://www.youtube.com/watch?v=jlKt2Ed-Y04&feature=youtu.be | |
require 'ardrone' | |
drone = ARDrone::Drone.new | |
drone.start | |
drone.take_off | |
sleep 5 | |
drone.turn_right(1.0) |
# -*- coding: utf-8 -*- | |
""" | |
Simple AES crypto thingy to to encrypt/decrypt passwords. | |
""" | |
from Crypto.Cipher import AES # http://pypi.python.org/pypi/pycrypto | |
DEFAULT_PADDER = '\x03' | |
DEFAULT_KEYLEN = 16 |
#!/bin/bash | |
declare -a args | |
while [ $# -gt 0 ] ; do | |
case "$1" in | |
-n) shift ;; | |
*) args=("${args[@]}" "$1") ; shift ;; | |
esac | |
done |
{ | |
{I have|I've} been {surfing|browsing} online more than {three|3|2|4} hours today, yet I never found any interesting article like yours. {It's|It | |
is} pretty worth enough for me. {In my opinion|Personally|In my view}, if all {webmasters|site owners|website owners|web owners} and bloggers made good content as | |
you did, the {internet|net|web} will be {much more|a lot more} | |
useful than ever before.| | |
I {couldn't|could not} {resist|refrain from} commenting. {Very well|Perfectly|Well|Exceptionally well} written!| | |
{I will|I'll} {right away|immediately} {take hold of|grab|clutch|grasp|seize|snatch} | |
your {rss|rss feed} as I {can not|can't} {in finding|find|to find} your {email|e-mail} subscription {link|hyperlink} or {newsletter|e-newsletter} service. Do {you have|you've} any? | |
{Please|Kindly} {allow|permit|let} me {realize|recognize|understand|recognise|know} {so that|in order that} I {may just|may|could} subscribe. | |
Thanks.| |
ror, scala, jetty, erlang, thrift, mongrel, comet server, my-sql, memchached, varnish, kestrel(mq), starling, gizzard, cassandra, hadoop, vertica, munin, nagios, awstats
Hut3 Cardiac Arrest - A script to check OpenSSL servers for the Heartbleed bug (CVE-2014-0160).
Note: This code was originally a GitHub Gist but has been copied to a full GitHub Repository so issues can also be tracked. Both will be kept updated with the latest code revisions.
DISCLAIMER: There have been unconfirmed reports that this script can render HP iLO unresponsive. This script complies with the TLS specification, so responsitivity issues are likely the result of a bad implementation of TLS on the server side. CNS Hut3 and Adrian Hayter do not accept responsibility if this script crashes a server you test it against. USE IT AT YOUR OWN RISK. As always, the correct way to test for the vulnerability is to check the version of OpenSSL installed on the server in question. OpenSSL 1.0.1 through 1.0.1f are vulnerable.
This script has several advantages over similar scripts that have been re