| # Check a single password interactively. | |
| # Usage: ruby pwned-interactive.rb | |
| require 'io/console' | |
| require 'open-uri' | |
| require 'digest' | |
| puts "The 5-character prefix of the password's SHA-1 hash will be sent." | |
| puts "For details, see https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/" | |
| print 'Password (hidden): ' |
Source: https://gist.github.com/findepi/04c96f0f60dcc95329f569bb0c44a0cd .
This should build the project. In case of problems, retry without the -T flag.
This is not the fastest way to build the project though. See below.
./mvnw -T1C clean install -DskipTests We played generals.io over the weekend. It gives some solid adrenaline rushes but we are prob going to take a break from it due to that and other priorities.
Quick tips:
- Use click + WASD to queue up traversals quickly (on your own squares you can chain it multiple times)
- Cities repopulate if not fully captured, be sure to have +2 to city count (1 for wipe out, 1 for move in)
Here is what we learned as some strategies:
- In 1v1, maps are set up with generals at 2 sides (e.g. North/South, East/West, Northwest/Southeast)
You do not need a separate /boot partition unless you have an LVM setup (used in dm-crypt setups).
Run ubiquity -b to open the installer with the option of skipping grub installation (since we're using systemd-boot).
When you get to the screen "Ubuntu has finished installation" choose Continue testing.
Open a Terminal.
Chroot into the new system.
| namespace Analogy | |
| { | |
| /// <summary> | |
| /// This example shows that a library that needs access to target .NET Standard 1.3 | |
| /// can only access APIs available in that .NET Standard. Even though similar the APIs exist on .NET | |
| /// Framework 4.5, it implements a version of .NET Standard that isn't compatible with the library. | |
| /// </summary>INetCoreApp10 | |
| class Example1 | |
| { | |
| public void Net45Application(INetFramework45 platform) |
| { | |
| "sort": ["_doc"], | |
| "size": 100, | |
| "query": { | |
| "bool": { | |
| "must": { | |
| "match_all": {} | |
| }, | |
| "filter": { | |
| ... |
Hacker News "hidden" URLs
Many of HN URLs are not easily discoverable as there are no links to them in a prominent part on the page, or sometimes even nowhere. The following is a list of links to standard and "special" HN pages. The ones is bold are the less discoverable ones.
See also: https://github.com/minimaxir/hacker-news-undocumented
| #!/bin/bash | |
| # i3 thread: https://faq.i3wm.org/question/150/how-to-launch-a-terminal-from-here/?answer=152#post-id-152 | |
| # Inspired by https://gist.github.com/viking/5851049 but with support for tmux | |
| CWD='' | |
| # Get window ID | |
| ID=$(xdpyinfo | grep focus | cut -f4 -d " ") | |
| # Get PID of process whose window this is |
| #!/bin/sh | |
| # | |
| # example usage: | |
| # xautolock -locker /full/path/to/screenlock.sh -corners 00-+ -detectsleep | |
| # | |
| # depends on xssstate which is part of suckless-tools: | |
| # http://tools.suckless.org/ or | |
| # apt-get suckless-tools on debian | |
| # |