This gist was moved to its own repository: https://github.com/aguslr/multibootusb
| import requests | |
| class HoverException(Exception): | |
| pass | |
| class HoverAPI(object): | |
| def __init__(self, username, password): | |
| params = {"username": username, "password": password} | |
| r = requests.post("https://www.hover.com/api/login", params=params) |
| // Just before switching jobs: | |
| // Add one of these. | |
| // Preferably into the same commit where you do a large merge. | |
| // | |
| // This started as a tweet with a joke of "C++ pro-tip: #define private public", | |
| // and then it quickly escalated into more and more evil suggestions. | |
| // I've tried to capture interesting suggestions here. | |
| // | |
| // Contributors: @r2d2rigo, @joeldevahl, @msinilo, @_Humus_, | |
| // @YuriyODonnell, @rygorous, @cmuratori, @mike_acton, @grumpygiant, |
To install tcptraceroute on Debian/Ubuntu:
$ sudo apt-get install tcptracerouteTo install tcptraceroute on CentOS/REHL, first set up RepoForge on your system, and then:
$ sudo yum install tcptracerouteThis is a supplement to the official Phabricator Installation Guide, because their guide will leave you with all kinds of permission and config errors and ~15,000 setup issues on startup.
# apt-get install mercurial subversion python-pygments sendmail imagemagick
This is a comment by Shane Wilton in this post from HH Information Security.
Start with MicroCorruption to familiarize yourself with reverse engineering and exploit development. It's ~18 challenges, entirely on the website, that task you with reverse engineering MSP-430 programs, and developing exploits against them.
From there, Pwnable.kr has another few dozen exploitation challenges. These are more real-world, but ramp up in difficulty quickly. The first block should be doable by anyone with Linux experience though.
If you're starting from the very beginning, keep Hacking: The Art of Exploitation nearby. It's a very good primer for all of this stuff. Once you work your way through that, [TAOCP](http://www.amazon.com/T
| <config> | |
| <!-- See sample config: /usr/share/doc/fahclient/sample-config.xml --> | |
| <!-- Client Control | |
| Don't fold anonymously, provide user info. --> | |
| <fold-anon v='false'/> | |
| <!-- Folding Slot Configuration --> | |
| <gpu v='true'/> <!-- If true, attempt to autoconfigure GPUs --> |
| # Original : http://en.community.dell.com/support-forums/servers/f/956/t/18394689 | |
| # Archive : http://archive.is/8LkJs | |
| I was also facing this issue, but had to jump some more hurdles: | |
| - In the Java Control Panel, add https://<server IP/hostname> to the exception site list. (not related to this issue, but needs to be done though) | |
| - In the Advanced tab (this is on windows) enable the console, so I could check what java version was being used. (I have 5 versions installed) | |
| - Edit the mentioned java.security for the correct version, but, I had to make an additional change. I also had to alter the "jdk.certpath.disabledAlgorithms" parameter, and remove MD5 there. Hence, enable MD5 support. |