I hereby claim:
- I am mclosson on github.
- I am mclosson (https://keybase.io/mclosson) on keybase.
- I have a public key whose fingerprint is E3D7 09DA F9F6 F3B3 0E9E 1D32 9656 6C5B 0883 A308
To claim this, I am signing this object:
# Rack HoneyToken Middleware | |
# | |
# Honey Tokens are unique and unlikely values that should be planted in various | |
# places within your web application to assist in the detection of a security | |
# breach. They are useful at trying to detect SQL injection attacks where the | |
# intended logic of an SQL query is bypassed and the HTTP request is used to | |
# attempt to download private data instead for example the users or accounts | |
# table and associated password hashes. | |
# | |
# Below is an example of creating three fake users with their password hashes |
#!/bin/sh | |
# Script to generate a baseline of known good values for a FreeBSD 10.x server | |
# The outputs should be able to be diff'd later to verify that no changes have occured | |
BASELINE=baseline | |
SUDO=/usr/local/bin/sudo | |
/bin/rm -rf $BASELINE | |
/bin/mkdir $BASELINE | |
/bin/hostname > $BASELINE/hostname |
# This is a shell archive. Save it in a file, remove anything before | |
# this line, and then unpack it by entering "sh file". Note, it may | |
# create directories; files and directories will be owned by you and | |
# have default permissions. | |
# | |
# This archive contains: | |
# | |
# devel/libCello | |
# devel/libCello/distinfo | |
# devel/libCello/Makefile |
# This is a shell archive. Save it in a file, remove anything before | |
# this line, and then unpack it by entering "sh file". Note, it may | |
# create directories; files and directories will be owned by you and | |
# have default permissions. | |
# | |
# This archive contains: | |
# | |
# libCello | |
# libCello/distinfo | |
# libCello/Makefile |
Above I'm working on a new port for libCello but getting stuck on a few issues I'm not sure how to approach: | |
Here's the port so far: | |
https://github.com/mclosson/libcello-freebsd-port/tree/master/ports/devel/libCello | |
https://github.com/mclosson/libcello-freebsd-port/blob/master/ports/devel/libCello/Makefile | |
https://github.com/mclosson/libcello-freebsd-port/blob/master/ports/devel/libCello/distinfo | |
https://github.com/mclosson/libcello-freebsd-port/blob/master/ports/devel/libCello/pkg-descr | |
https://github.com/mclosson/libcello-freebsd-port/blob/master/ports/devel/libCello/pkg-plist |
Index: net/tcpdump/Makefile | |
=================================================================== | |
--- net/tcpdump/Makefile (revision 373799) | |
+++ net/tcpdump/Makefile (working copy) | |
@@ -2,7 +2,7 @@ | |
# $FreeBSD$ | |
PORTNAME= tcpdump | |
-PORTVERSION= 4.5.1 | |
+PORTVERSION= 4.6.2 |
# https://blog.spideroak.com/20140814060007-status-reports-transparency-overall-safety | |
# https://spideroak.com/canary | |
# https://en.wikipedia.org/wiki/Warrant_canary | |
# https://www.eff.org/deeplinks/2014/04/warrant-canary-faq | |
# https://en.wikipedia.org/wiki/National_security_letter | |
# | |
# SpiderOak now maintains a warrant canary so they can passively let their users know | |
# if they have been served a National Security Letter or other legal tool which | |
# prevents them from actively disclosing to their users that they are being coerced | |
# or forced into compromising the security or privacy of their userbase. |
I hereby claim:
To claim this, I am signing this object:
require 'minitest/autorun' | |
class Bitlib | |
# Add Implementation Here | |
end | |
class Encryptor | |
# Add Implementation Here | |
end |
require 'minitest/autorun' | |
require 'set' | |
class FiniteSet < Set | |
def fetch(item) | |
if member?(item) | |
delete(item) | |
item | |
end | |
end |