I hereby claim:
- I am hackerkid on github.
- I am vishnuks (https://keybase.io/vishnuks) on keybase.
- I have a public key whose fingerprint is CFF4 07C5 EAC1 E497 2ACA 8BCA F35F 9D8A 1378 3206
To claim this, I am signing this object:
#include <stdio.h> | |
#include <stdlib.h> | |
#include <unistd.h> | |
#include <errno.h> | |
#include <string.h> | |
#include <sys/types.h> | |
#include <sys/socket.h> | |
#include <netinet/in.h> | |
#include <arpa/inet.h> | |
#include <netdb.h> |
# Path to your oh-my-zsh installation. | |
export ZSH=/home/vishnu/.oh-my-zsh | |
# Set name of the theme to load. | |
# Look in ~/.oh-my-zsh/themes/ | |
# Optionally, if you set this to "random", it'll load a random theme each | |
# time that oh-my-zsh is loaded. | |
ZSH_THEME="pure" | |
autoload -U promptinit && promptinit |
I hereby claim:
To claim this, I am signing this object:
import smtplib | |
server = smtplib.SMTP('smtp.gmail.com', 587) | |
server.starttls() | |
server.login("email", "password") | |
msg = "YOUR MESSAGE!" | |
server.sendmail("[email protected]", "[email protected]", msg) | |
server.quit() |
#include <iostream> | |
#include <stdio.h> | |
#include <string.h> | |
#include <map> | |
#include <utility> | |
#define check(n, pos) (n & (1<<pos)) | |
#define set(n, pos) (n | (1<<pos)) | |
using namespace std; | |
int n; |
npm config set registry http://registry.npmjs.org/ | |
npm --http http://172.31.1.4:8080 install browser-sync |
##Learn NodeJs Fundamentals from NodeSchool (install learnyounode) | |
* If you are facing installation problem use this for installing learnyounode | |
sudo npm --proxy http://iit2013075:[email protected]:8080 install -g learnyounode | |
elsif x == "#" | |
redirect_to not_sucess_path | |
else | |
redirect_to :show | |
end |
Greetings! | |
We know you have dreams, we do too. | |
At Hack In The North, we work to break down whatever's keeping you from making those dreams a reality. Whether its knowledge or access to materials - whatever the barrier is, consider it a bit more manageable at Hack In the North. In Hack In The North, participants (“hackers”) get to spend 36 hours work to build or code something they dream of. There would be workshops, mentors, internet and piles of food to guide you along the way and keep you focused. | |
In all, you bring your ideas, and we give you everything you need to make them come to life. The solutions can range in platform and application, including elements of web development, mobile applications, hardware project, and more. Hackathons are one of the best ways to educate people about technology. Inexperienced hackers may often learn some new skills by participating in a hackathon. |
{"0.6864806429384607":"-----BEGIN PGP PUBLIC KEY BLOCK-----\r\nCharset: UTF-8\r\n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\r\nro1u9qWVd2BHREWbVosiTf49rw/rUGH5Tw==\r\n=0CBt\r\n-----END PGP PUBLIC KEY BLOCK-----\r\n","0.9040975074848083":"-----BEGIN PGP PUBLIC KEY BLOCK-----\r\nCharset: UTF-8\r\n\r\nxv8AAABSBAAAAAATCCqGSM49AwEHAgMElFqDkTynQqdgjOGD6buuhJvTSCX8Uvuw\r\nrfBDy1wwMJ9m0GmYB//yQc7Kgs55oKGspHgXK5oZdCulk9JTgn8gzc3/AAAACDxn\r\naXRodWI+wv8AAACOBB |