Details and where I ripped most of this from is at: http://askubuntu.com/a/537197
Another reference with detailed explanation of the vulnerability: http://security.stackexchange.com/questions/70719/ssl3-poodle-vulnerability
#!/usr/bin/env bash | |
# | |
# https://gist.github.com/beporter/8074237fa5a71f77dc5c | |
# [email protected] | |
# 2015-09-14 | |
#--------------------------------------------------------------------- | |
usage () | |
{ |
Details and where I ripped most of this from is at: http://askubuntu.com/a/537197
Another reference with detailed explanation of the vulnerability: http://security.stackexchange.com/questions/70719/ssl3-poodle-vulnerability
$ curl https://api.github.com/zen | octocatsay | |
MMM. .MMM | |
MMMMMMMMMMMMMMMMMMM | |
MMMMMMMMMMMMMMMMMMM ____________________________ | |
MMMMMMMMMMMMMMMMMMMMM | | | |
MMMMMMMMMMMMMMMMMMMMMMM | Practicality beats purity. | | |
MMMMMMMMMMMMMMMMMMMMMMMM |_ ________________________| | |
MMMM::- -:::::::- -::MMMM |/ | |
MM~:~ ~:::::~ ~:~MM |
@media only screen and (min-width: 320px) { | |
/* Small screen, non-retina */ | |
} | |
@media | |
only screen and (-webkit-min-device-pixel-ratio: 2) and (min-width: 320px), | |
only screen and ( min--moz-device-pixel-ratio: 2) and (min-width: 320px), | |
only screen and ( -o-min-device-pixel-ratio: 2/1) and (min-width: 320px), |
The [RFC for a new simple to use password hashing API][rfc] has just been accepted for PHP 5.5. As the RFC itself is rather technical and most of the sample codes are something you should not use, I want to give a very quick overview of the new API:
Everybody knows that you should be hashing their passwords using bcrypt, but still a surprising number of developers uses insecure md5 or sha1 hashes (just look at the recent password leaks). One of the reasons for this is that the crypt() API is ridiculously hard to use and very prone to programming mistakes.
{ | |
"bold_folder_labels": true, | |
"color_scheme": "Packages/User/Espresso Soda.tmTheme", | |
"ensure_newline_at_eof_on_save": true, | |
"file_exclude_patterns": | |
[ | |
".DS_Store", | |
".gitkeep", | |
"dump.rdb" | |
], |
var parser = document.createElement('a'); | |
parser.href = "http://example.com:3000/pathname/?search=test#hash"; | |
parser.protocol; // => "http:" | |
parser.hostname; // => "example.com" | |
parser.port; // => "3000" | |
parser.pathname; // => "/pathname/" | |
parser.search; // => "?search=test" | |
parser.hash; // => "#hash" | |
parser.host; // => "example.com:3000" |
<?php $span = isset($span) ? $span : 8; ?> | |
<?php $page = isset($this->request->params['named']['page']) ? $this->request->params['named']['page'] : 1; ?> | |
<div class="pagination"> | |
<ul> | |
<?php echo $this->Paginator->prev( | |
'← ' . __('Previous'), | |
array( | |
'escape' => false, | |
'tag' => 'li' | |
), |
// a bunch of ways to get from 4 => 04 (whilst maintaining 40 => 40). This would be a pad function for times, hours, mins, seconds. | |
var i = 4; | |
// while | |
while((i+'').length<2)i='0'+i | |
// greater than 9 | |
i=(i>9?i:'0'+i) |
[url "git://github.com/"] | |
insteadOf = "ghg://" | |
pushInsteadOf = "ghg://" | |
# Example: git clone ghg://ntschutta/emacs | |
[url "git://github.com/matthewmccullough/"] | |
insteadOf = "ghgm://" | |
pushInsteadOf = "ghgm://" | |
# Example: git clone ghgm://hellogitworld | |
[url "[email protected]:"] | |
insteadOf = "ghs://" |