http://www.colm.net/pipermail/ragel/2017-April/001710.html
I don't use Windows machines much also nowadays but I have a simple solution that one without a Windows can also build ragel windows binary
#include <Core/CoreAll.h> | |
#include <Fusion/FusionAll.h> | |
#include <string> | |
using namespace adsk::core; | |
using namespace adsk::fusion; | |
using namespace std; | |
Ptr<Application> app; |
Download the list of password hashes from https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/ unpack it and check it against your keepass file with this script. | |
requires python3, libkeypass from https://github.com/libkeepass/libkeepass and | |
``` | |
apt-get install python3-crypto python3-lxml | |
``` | |
http://www.colm.net/pipermail/ragel/2017-April/001710.html
I don't use Windows machines much also nowadays but I have a simple solution that one without a Windows can also build ragel windows binary
boost_* | |
pcb2gcode/ | |
pcb2gcodeGUI/ | |
pcb2gcode.list | |
*~ |
#!/bin/bash | |
find /data/files -ctime 7 -type d -print0 | du --files0-from=- -m | awk '{i+=$1} END {print i}' |
[TCP segment of a reassembled PDU] | |
[TCP segment of a reassembled PDU] | |
[TCP segment of a reassembled PDU] | |
[TCP segment of a reassembled PDU] | |
PDU A | |
[TCP segment of a reassembled PDU] | |
[TCP segment of a reassembled PDU] | |
[TCP segment of a reassembled PDU] | |
[TCP segment of a reassembled PDU] | |
PDU B |
[TCP segment of a reassembled PDU] | |
[TCP segment of a reassembled PDU] | |
[TCP segment of a reassembled PDU] | |
[TCP segment of a reassembled PDU] | |
PDU A | |
[TCP segment of a reassembled PDU] | |
[TCP segment of a reassembled PDU] | |
[TCP segment of a reassembled PDU] | |
[TCP segment of a reassembled PDU] | |
PDU B |